Wednesday, December 29, 2010
Weak current College】 【resolve wireless network security threat approach --- Power By】 【China power house network.
<br> <br>】 【Printer brief <br> Accompanied by low grade wireless network equipment prices are low, as well as operational and more convenient, low grade wireless LAN networks in recent years gained rapid popularity. In order to facilitate resource sharing ., wireless, print, mobile office operation, we only consume a few hundred bucks to buy a common wireless router and a wireless device, you can quickly set up a simple wireless LAN network. However, low grade wireless LAN network continues to spread, it .is easy for your organization's information security threats are not small. In this case, we can resolve the low grade of wireless network security threats, and enjoy the fast, convenient network? <br> Accompanied by low grade wireless network equipment prices are low, .as well as operational and more convenient, low grade wireless LAN networks in recent years gained rapid popularity. In order to facilitate resource sharing, wireless, print, mobile office operation, we only consume a few hundred bucks to buy a common wireless router and a .wireless device, you can quickly set up a simple wireless LAN network. However, low grade wireless LAN network continues to spread, it is easy for your organization's information security threats are not small. In this case, we can resolve the low grade of wireless .network security threats, and enjoy the fast, convenient network? <br> <br> Low level network security ills <br> <br> Wirelessly connect to community broadband network, and through broadband networks for shared access to the Internet network environment, we .often just by ordinary twisted pair will low wireless router WAN port and community broadband network switch ports, and then reference manual on wireless router connection port parameters for the appropriate settings, you can access the Internet. Because by default, the low range of the wireless .router will automatically enable DHCP service functions, when we add a wireless network adapter devices correctly installed on the computer, do not require any parameter is set to automatic connection to a wireless LAN network. However, in the enjoyment of networking facilities, low grade wireless .router's signal coverage and support the longest transmission distance up to 300 meters, if not taken security measures to prevent, at 300 meters within the installed wireless adapter device of ordinary computers can automatically join local wireless LAN network, then the local wireless local area network is .vulnerable to illegal attacks. <br> <br> Moment, the formation of convenient low grade wireless LAN exist following some security flaws: <br> <br> 1, the security mechanism is not very sound <br> <br> Low grade .wireless LAN are mostly adopted the safety performance of a general agreement to WEP on wireless Internet signal is encrypted transmission, without selection of the safety performance of the higher the WAP protocol to protect the transmission of wireless signals. Ordinary Internet users, even if using WEP .encryption protocol, WEP key, the attacker can still illegally by some professional attack tools to easily decipher the encrypted signal, thereby easily intercept customers Internet addresses, network identification name, wireless channel information, WEP key content and other information, with this information in hand ., the attacker can easily on a local wireless LAN network for theft, privacy, or other unlawful invasion operations. <br> <br> In addition, low grade wireless LAN almost do not support system log management, intrusion detection and other security features, .you can say that the current low grade wireless LAN Security also not quite perfect. <br> <br> 2, no physical isolation <br> <br> Low grade wireless LAN from forming successful at that moment, it is directly exposed to the .outside world, wireless network access could be any valid physical isolation, intentional, unintentional illegal attack at any time exists, then the wireless LAN in all kinds of private information will always be stealing, sniggering. <br> <br> 3. user safety .awareness is not enough <br> <br> Low grade wireless LAN often only support simple address binding, address filtering and encrypted transmission function, these basic security features in the presence of illegal attacker almost no preventive effect. However, some less familiar with wireless .network knowledge of users in order to be able to quickly implement Mobile Office, resource sharing, and other purposes, often will not hesitate to use network management and maintenance of low-cost, easy operation and low grade wireless LAN, wireless LAN Security how to .believe these primary Internet users almost never make any consideration. Coupled with these not-too-familiar with wireless network knowledge of novice, on network security knowledge to understand even less, these users are using wireless networks with very little sense to go for some security .settings. <br> <br> 4. poor resistance to outside interference <br> <br> Wireless LAN in the work process, tend to use a specific working band, the work in the same band wireless network too much, the signal coverage .will overlap each other, it would seriously affect the efficient signal strength, may ultimately affect the wireless LAN signal transmission stability; in addition, the wireless Internet signal during the transfer process, are particularly vulnerable to the wall of the building blocks or interference, this .will cause the stability of wireless local area network. For those of low grades of wireless local area network, its resistance to outside interference ability is even worse, it is clear that such a wireless LAN is unable to meet the high quality network access application requirements .. <br> <br> Networking facilitated by security threats <br> <br> Since low grade wireless LAN exist above some security flaws, these evils if sudden attack or unauthorized attackers exploit, then you may give us a lot of security threats: .<br> <br> 1, resulting in the leakage of private information <br> <br> Sometimes, many wireless LAN Internet users in order to facilitate the work, often inadvertently set units of important privacy information or core work information, even some .areas belonging to the top secret information from a mobile device to hang on the wireless LAN network, making it easy to occur imperceptibly important privacyThe risk of information leakage, serious time to give the unit or individual cause great economic losses. <br> <br .> 2, reduce intranet security capabilities <br> <br> Unit wireless LAN nearby sometimes exist some household wireless local area network or other units of wireless local area network, the wireless LAN is often used to share access to mobile office or Internet network, .the wireless network users are not enough security awareness, and their application to the requirements of the wireless network is not very high, it has to do some of the wireless Internet access and security settings. In this case, the organization any computer with a wireless .network adapter devices notebooks are also likely to automatically connect to other wireless local area network, it is prone to this unit of the wireless LAN and other units of wireless LAN direct Internet phenomenon, even possible unit wireless LAN network interconnect directly with the Internet, these .phenomena clearly reduces the unit intranet security prevention capacity, easy to unit caused serious security ramifications. <br> <br> 3, endangering the security of information systems <br> <br> Considering the low grade wireless LAN low-cost, no need .for complicated wiring, and managing maintenance is also very convenient, if safety awareness is not in place, then a smaller unit is most likely due to technical, cost and other factors, to choose some cheap, poor quality of the wireless network devices in network .upgrade, information point, set up by the network devices and network will be natural exposure to the outside world, wireless network access cannot be effective physical separation, then your organization's information systems security will be compromised at any time. <br> <br> .Resolve wireless network security threats <br> <br> Although low grade wireless LAN easily bring us all kinds of unexpected security threats to your organization's information systems do not small security risk, but for those who have security requirements is not very high, small- .scale units, you can still use a low grade of wireless local area network, after all, this type of networking costs very low, more importantly, through the development of effective measures can be low grade wireless LAN security threat reduced to a minimum, make .small unit users can freely enjoy networking facilities. <br> <br> 1, to check to security <br> <br> In order to keep informed of units the security status of your wireless network, we should periodically on the unit's intranet, .extranet usage and core network equipment for operation in more detail check and do a thorough inspection records. At the same time, we also should increase its efforts on the unit near the area of wireless LAN wireless network to work environment monitoring the trends of the time .also need to be on the Organization's network security assessment and audit; in addition, related to the core privacy information in the units, as well as important application in the workplace network, should be promptly taken to electromagnetic shielding, and other means, to prevent .illicit intrusion or attack. <br> <br> 2. to promote the safe <br> <br> Because of the low grade wireless LAN easily affect internal network security, the owner must prepare a rich range of network security information in the units ., under the regular wireless Internet security knowledge, advocacy, training, in order to strengthen every wireless Internet users' security awareness, at the same time it is necessary to conduct network security special rectification work to ensure that all employees unit in thought attaches great importance .to the wireless network security. <br> <br> 3, from management security <br> <br> Saying "no rules, no RADIUS", in order to guarantee the use of wireless LAN security, we also want to use wireless network .devices to make reasonable provisions for wireless Internet users to conduct reasonably management and unified specification wireless network device mode and security settings, clear the use of the Internet users and access rights; for example, prohibited save important company information for laptops to connect to a wireless .local area network, prohibition of the arbitrary in wireless LAN for shared access to prohibit mobile devices randomly hanging on a wireless local area network, storage, processing core information workplaces must shield protection. <br> <br> Believe in clearly recognizes the existence of .low grade wireless LAN security threats of all kinds, we just take effective security measures to prevent or to enjoy the convenience of wireless network so that low grade wireless LAN also can provide us with the "service". <br>.
【 Weak current College 】 ghostxp version installation FAQ
FAQs:
1. GHOST of popup a dialog ~ that it can't find a file called GHOSTERR.TXT ~ "
Estate settlement: make sure the disc slow burn, PQ or formatc:/u put the C disk formatted with the FAT32 format is recommended. Sometimes do not format, repeat 2-3 times the clone can be successful.
2, an i/o error occured?
The present preliminary judging this problem occurs because the floppy disk image file IMG. If you want to use the CD clone system, only manually this trick. Boot CD MSDOS7.1, menu 2 DOS-REAL mode, and then on to CD, boot GHOST8.0 EZBOOT\GHOST directory, and then put the CD in the root directory of the GHO file cloned to the target partition.
3, power management mode, how to modify?
If during the installation process, if you see a display of power management mode, you can also change. (Usually by a computer automatically determine)
? If you can enter the system, you can have the program C:\ProgramFiles, run AUTOSETHAL.CMD
If the system cannot enter, you can use the tools on your CD.
4. power management mode what type?
?ACPIMultiprocessorPC
Typically used after 2003 buy computer, Win2000-2003 support this kind of power supply mode. To install more than one processor ACPI multiple-processor board, is in ACPI mode dual-processor computer (Board supports dual-processor), if the motherboard supports HT (Hyper-Threading) and you install support HT features CPU motherboard/install double CPU's early entry dual-CPU motherboard/entry level server and a small part of the departmental servers, such as INTEL845GEL845PE, 865PE above and use the P4X.XHTCPU, 2004 and beyond, this camera is more prevalent.
?MPSMultiprocessorPC
MPSmultiprocessorPC: APM mode dual-processor computer (Board supports dual-processor)
Win2000WinXPWin2003 support. Please check your motherboard or computer manuals, carefully chosen.
?CompaqSystemProMultiprocessoror100%Compatible
CompaqSystemProMultiprocessoror100% Compatible is rare, huh, huh, I don't know how to write description
Win2000WinXP support, does not apply to Win2003.
?ACPIUniprocessorPC
Typically used after 2003 purchase high-end computer, Win2000-2003 support this in power mode. To install a processor ACPI multiple-processor board, is in ACPI mode dual-processor computer (motherboard does not support dual processor), or in the ACPI mode of single-processor computer, motherboard with APIC features, such as SIS748/most INTEL845 series/VIAKT600/nVIDIAnFORCE2 or update of the product, usually the camera after 2003 use this pattern.
?MPSUniprocessorPC
MPSsingleprocessor: APM mode dual-processor computer (Board supports dual-processor), or APM mode for single-processor computer, motherboard with APIC features Win2000WinXPWin2003 support. Please check your motherboard or computer manuals, carefully chosen.
?AdvancedConfigurationandPowerInterface[ACPI]PC[Default]
Generally used to 2003 years ago bought a computer that is currently the most common type, Win2000-2003 support ACPI for use with single-processor ACPI system for single-processor board, is in ACPI mode for single-processor computer, the Board does not provide the APIC features. If you select the start has been found in the upper left corner of the cursor flashing cannot enter the system please open the ACPI in the BIOS. On-board chip above the BX440 is less than or equal to INTEL815/SIS735/NFORCE1/ALI/VIAKT400/VIAP4X266, General 2003 previous camera supports this mode.
?StandardPC
StandardPC General on any standard PC, non-ACPI, or non-MPS, 386, 486, Pentium2350 following or other types of machinery;
All systems are supported, but new motherboards support ACPI and opens a new motherboard to use ACPI, this may lead to soft off!
There is another kind of:
?SiliconGraphicsVisualWorkstation
SiliconGraphicsVisualWorkstation
Very rarely, and only Win2000 support
5. GHOST version of XP is how to make the entire production process of?:
Normal install SP2 integrated buildings of XP.
Change your computer?, a standard computer and a standard dual hard drive, restart the computer after confirmation. This is a crucial key! 2 standard PC appears, then uninstall a! IDE controller if it is not the standard two-channel PCIIDE controller, you must change the! there is no need to do other remove hardware.
? S & & R installed SV5.2.1.exe, this stuff is the core!
Run backup DLLCACHE DllCacheManager "folder in most files, perform DllCacheManager.REG.
Perform the final click regset.cmd? packaging, default opt! (you cannot choose restart)
6. I own a GHO, replace the CD GHO file?
Yes. You can make your own GHO, arbitrary name (suffix can only be the GHO). Remove the CD-ROM root directory GHO file, put on your production GHO file is OK!
【 Weak current College 】 Windows system top ten viruses hiding place
Virus found, but both in safe mode or Windows fail to clear the? due to some particularities of directories and files, there is no way to directly, including the security mode to kill the poison and so some antivirus, but need some special means clear poison file. The following is the directory that contains the following subdirectories.
1, poison file in TemporaryInternetFiles directory.
Because this directory of files, Windows will have a certain protective effect (unconfirmed). So on this directory of poison files even in safe mode is not clear, in this case, please close other programs, software, and then select open IE, IE toolbar "Tools", "Internet Options", select "delete files" to remove it, if you are prompted "delete all offline content", or select one and deleted.
2. poison files in the _Restore directory, or SystemVolumeInformation directory.
This is a system restore to restore the files stored in the directory with the WindowsMe/XP operating system will have this directory, because the system on this directory has a protective effect. In this case you need to cancel the system restore feature, and then remove the poison file, or even delete the entire directory is also acceptable. Turn off System Restore. WindowsMe, disable System Restore, DOS. XP turn off system restore methods: right-click on "my computer", select "Properties"--"system restore"--"in all the drives on the turn off System Restore" tick-front-press the "OK" to exit.
3, poison file .rar, .zip, .cab, etc. compressed file.
Now supports direct killing the compressed file poison file anti-virus software also rarely, can only support the common compression format; therefore, the vast majority of anti-virus software, can only be detected in the compressed file, the poison file rather than directly to clear. And some encrypted compressed files was not possible to directly cleared.
To clear the compress the file, it is recommended that the extracted clear, or with the compression tools software external antivirus program functionality, the poison of compressed file anti-virus.
4. virus in the boot sector or SUHDLOG.DAT or SUHDLOG.BAK file.
This virus is usually a boot sector virus, the virus name General report with boot, wyx. If a virus is present on the mobile storage device, such as a floppy disk, Flash disk, removable hard drive, you can rely on local hard drive antivirus software directly for killing; when the virus is on the hard disk, you need to use a clean, bootable disk boot for killing.
For this particular virus is recommended to start with a clean floppy disk, but killing the killing must be backed up before the original boot sector, in particular the original fitted with another operating system, such as Japanese Windows, Linux, etc.
If you do not have a clean, bootable disk, you can use the following methods for emergency antivirus:
(1) in the other computer to do a clean, bootable disk, the boot disk in Windows95/98/ME systems through the Add/Remove programs to produce, but it is important to note that the operating system be floppy and your operating system you use;
(2) use this floppy boot the computer to start the poison, and then run the following command:
A:>fdisk/mbr
A:>sysa:c:
If poison is in the file or files in SUHDLOG.BAK SUHDLOG.DAT, then you can directly delete. This is the system in install on hard drive boot sector of a backup file, the General effects of the virus in which has no effect.
5. poison file suffix name is .kbk .vir, .kav, etc.
These files are generally are some anti-virus software on the original poison files do backup file, in General, if you verify that these files are useless, and that will delete these files.
6, the poison message file in some files, such as dbx, eml, box, etc.
Some anti-virus software can directly check the mail file is poison, but often cannot that poison files directly, for some mailboxes in a letter of the poison, according to anti-virus software provides information to find that the poison of letter, delete the attachment in the message or delete it; if the eml, nws some mail file poison, you can use the relevant mail software to open, confirm the message and its attachment, and then remove the relevant content. Generally, there is a wide range of eml, nws's poison files, are automatically generated files for viruses, we recommend that you are directly deleted.
7, file a virus residue code.
This situation more see is with CIH, Funlove, macro viruses, including Word, Excel, Powerpoint and Wordpro, document macro viruses and virus-individual Web pages, usually the residue code on these antivirus viruses residue code file reports with the virus name suffix is typically the end such as int, app, but is not common, such as W32/FunLove.app, W32.Funlove.int. In General, these remnants of the code does not affect the normal proceduresRun, it will not be transmitted, if you need to completely clear, according to the actual situation of each virus removal.
8, file error.
This situation occurs, usually some anti-virus software will file the original poison and not very cleanly remove the virus, nor good repair the file, the resulting file is not in working condition, while other anti-virus software of false positives. These files can be directly deleted.
9, encrypted files or directories.
For some of the encrypted file or directory in decrypted after killing the virus.
10, shared directory.
There are two situations: the local share directory and network remote shares (including maps). Experiencing local share directory of poison file cannot be cleaned, usually LAN other users read and write to these files, when expressed as anti-virus cannot directly to clear these poison file, if it is a virus in these directories are writable virus operation, performance for the shared directory to remove the virus, or keep a file is infected or constantly generate virus files. The two cases above, it is recommended that cancel the share, and then for a shared directory for a thorough clean, restore shared, careful not to open up too high, and add to the shared directory. On the remote share directory (including maps) killing viruses, it is first necessary to ensure that the local computer's operating system is clean, while the shared directory also has the highest read and write permissions. If the remote computer is infected with a virus, recommendations or directly on a remote computer for killing the virus. In particular, if you clear the levels of virus sometimes are proposed to remove all the local share for anti-virus operation. In normal use, should also pay attention to the security of the shared directory, an additional password, at the same time, it is not necessary, do not directly read remote shared files in a directory, it is recommended that you copy to a local check for viruses after operation.
To add one:
It is recommended that you follow the following operation a try: first mouse right click on my computer-properties-system restore-put in all the drives on the turn off System Restore on the front of the check.
Then go into safe mode (restart, press the F8 key) to the following three folders in the file are all empty.
C:WINDOWSTemp
C:DocumentsandSettings LocalSettingsTemp with username
C:DocumentsandSettings username LocalSettingsTemporaryInternetFiles
Then disinfect (safe mode) a try. Two folders inside the "username" is your landing systems login name, if you have not been modified. User name: Administrator.
【 Weak current college 】 computer file format conversion (1)
PBL for 訶 owerBuilder development environment of PowerBuilder dynamic library
You can export a bitmap PBM
PBRPowerBuilder resources
PCDKodakPhoto-CD image; P-Code compiler test scripts, testing by Microsoft and MicrosoftVisual test
PCEMapsEudora mailbox name of the DOS filename
PCLHewlett-Packard printer control language file (printer standby bitmap)
PCM sound file formats; OKIMSM6376 synthesis chips PCM format
PCPSymantecLiveUpdatePro files
PCSPICS animation files
PCTMacintoshPICT
PCXZsoftPC brush bitmapped
PDB3ComPalmPilot database file
PDD can used PaintShopPro or other image processing software to open the graphic images
PDFAdobeAcrobat exportable document format files (available Web browsers display); Microsoft Systems Management Server package definition file; NetWare printer definition file
PDPBroderbund of PrintShopDeluxe files
PDQPatton & attonFlowerchartingPDQLite files
PDS photographic image file (the file format of the source is not clear)
PFAladdin system on private files for encrypted files
PFA type 1 fonts (A S C Ⅱ)
PFB type 1 fonts (binary)
PFCPF components
PFM printer font scale
PGD good privacy (PGP PrettyGoodPrivacy,) virtual disk files
PGLHP plotter drawing paper
PGM can output a grayscale image (bitmap)
PGP with good privacy (PGP) algorithm to encrypt a file
PH by Microsoft Help compiler-generated temporary file
PHP, PHP3 contains PHP scripts in HTML pages
PHTML contains PHP script HTML page; the HTML Perl analysis explained
PICPC Paint bitmap; Lotus pictures; MacintoshPICT drawing
PICTMacintoshPICT graphics files
PIF program information file; IBMPIF drawing file
PIGLucasArts of DarkForcesWAD files
PINEpicPinball data file
PIX built-in system bitmap
PJMKS source integrity file
PJX, PJTMicrosoftVisualFoxPro project file
PKGMicrosoftDeveloperStudio application extension (and DLL files)
PKRPGP public key ring
PLPerl procedural
REND386/AVRIL PLG consists of the use of file format
PLIOracle7 data description
PLMDiscorderTracker2 module
PLSDisorderTracker2 sample files; MPEGPlayList file (used by WinAmp)
PLTHPGL plotter drawing paper; AutoCADplot drawing file; Gerber sign-making software
PM5Pagemaker5.0 files
PM6Pagemaker6.0 files
PNG Portable Network Graphics bitmap; PaintShopPro browser directory
PNT, PNTGMacPaint graphics files
POGDescent2PIG file extensions
POLWindowsNT policy files
POPVisualdBASE Verkhnyaya files
POTMicrosoftPowerpoint module
POV video ray tracer interning
PP4PicturePublisher4 bitmap
PPAMicrosoftPowerpoint interpolation filter
The Pinnacle program file PPFTurtleBeach
PPM portable pixel map bitmap
PPPParsonPowerPublisher; SerifPagePlus desktop publishing default output
PPSMicrosoftPowerpoint slide show
PPTMicrosoftPowerpoint presentation
PQIPowerQuest drive image files
PRC3COMPalmPiltt resources (text or program) file
PRELotusFreelance presentation
PRFWindows system files, Macromedia Director settings files
PRGdBASEClipper and FoxPro program source file; WAVmaker program
PRJ3DStudio (DOS) project files
PRN print table (with a space-delimited text); DAtaCADWindows printer files
PRPOberson of Prospero data conversion products saved project file
PRSHarvardGraphicsforWindows demo files
PRT print format files; Pro/ENGINEER symbol files
PRVPsiMailInternet provider template file
PRZLotusFreelanceGraphics97 files
PSPostscript format file (PostScript printer readable files)
PSBPinnacleSoundBank
PSDAdobephotoshop bitmap file
PSIPSIONa-Law sound files
PSMProtrackerStudio model format; Epic game source data files
PSPPaintShopPro image file
PSTMicrosoftOutlook personal folder file
PTDPro/ENGINEER table file
PTMPolytracker Music module (MOD) file
PUBVenturaPublisher publications; MicrosoftPublisher document
PWDMicrosoftPocketWord document
PWLWindows95 password list file
PWPPhotoworks image files (by Photoworks browse a series of files)
PWZMicrosoftPowerpoint Wizard
PXLMicrosoftPocketExcel spreadsheet
PY e-mail messages from Yahoo; Python script file
【 Weak current College 】 LCD monitor is not appropriate to use screensaver
CRT (cathode ray tube) monitors Imaging principle mainly by filament heating emission cathode, e, and then accelerate very electric field, by focusing very accumulation of very fine, high-voltage electron beam in the anode, gain enormous energy, at very high speeds to bombardment phosphor layer. The goal of the electron beam bombardment is on RGB phosphor screen. To this end, the gun fired the electron beam is not a bundle, but three beams, they are victims of computer graphics R, G, B the three primary colors video signal voltage control, go to the bombardment of phosphor unit to display the full image.
In the graphical interface of the operating system, the display of color variety, when the user stops on the computer, the screen display will remain fixed in the same picture, the electron beam long bombardment of fluorescent layer the same region, long time, because display fluorescent layer fatigue effect causes the screen to aging, even the picture tube is breakdown. Therefore, from Windows3.X times screen saver has been working as the best protection of CRT display help, by changing the graphic display to a fixed point on the fluorescent layer will not be long bombardment, thus avoiding damage to the screen. While LCD (LiquidCrystalDisplay), LCD screen, it's core structure is similar to a "sandwich" of two pieces of glass substrate intermediate full motion of the liquid crystal molecules. Signal voltage direct control of thin film crystals is on or off, and then use the transistor control liquid crystal molecules, liquid crystal molecules have obviously optical anisotropy, capable of firing from a backlight lamp light for image display. While a full screen from the large number of pixels, each pixel as a switch carriers. This way you can control the display's resolution. If a LCD resolution can reach 1024x768 (XGA), it is represented by 1024X768 pixel point available for display. Therefore from LCD works can explain a lot of people will ask questions such as why the best resolution fixed LCD, LCD refresh rate why only 60Hz.
From the above we see the LCD works, one is showing the image of the LCD, the liquid crystal molecules has always been in the State of the work of the switch, for a response time of LCD work reached 20ms 1 seconds, liquid crystal molecules are switched around hundreds of times. The liquid crystal molecules of switching frequency will be life, the life of the LCD will appear and the phenomenon of aging, such as bad points, and so on. So when we are on the computer stop action also makes the screen display colorful repeated movement of the screen saver will undoubtedly make liquid crystal molecules are switched in repeatedly. Therefore, would not be appropriate for an LCD monitor with a screen saver.
【 Weak current College 】 wireless router application fault address ARP attack
<br> <BR> With the current rapid development of information technology society, office of the enterprise network has now formally entered the field of wireless networks. .Construction of the wireless network without biggest advantage is that network cabling, easy to use and economical. .So for most enterprises, network scheme is undoubtedly the best choice. .<BR> <BR> Large number of wireless routers are used for business, making for fault diagnosis and wireless networks and wired network security becomes as important. .<BR> <BR> Office in the enterprise wireless networks often use the manual will be some difficult and is not involved in trouble, and sometimes difficult to cope, can not be resolved. .Here's wireless network caused by the router, the typical failure analysis, and provide solutions. .<BR> <BR> <BR> <BR> Connection error line network lines unreasonable barrier there are many reasons, but the first thing to check is the connection configuration for errors. .<BR> <BR> Power to ensure that the router first check the premise of normal broadband access terminal. .Lights on the router side can explain whether it is normal broadband access lines by the manual which can identify light for broadband access and client to observe the light shining state, continuous blinking as normal, or long light does not shine .the fault is not blinking. .We can glue line for a broadband line to replace the original connection. .<BR> <BR> If the problem persists, please see the placement of the router and the receiver is too far away from the computer or the middle of large obstructions. .Then please re-place the router, wireless router and receiving computer to do too many obstacles interval, and to the wireless router to receive the computer within the scope of signal transmission can be. .<BR> <BR> Wireless card check is also essential, you can replace the new card and re-install the driver for debugging, then card, click "View Available Wireless Connections" refresh "network list" after the set card parameters, and .and then "Properties" to view the availability of data transmission and reception, troubleshooting. .<BR> <BR> Of course, is the router's own hardware failure caused a direct line makes no sense, but this is not what we can to resolve the scope, should promptly contact manufacturer for repair or replacement. .<BR> <BR> Set incorrectly can not connect <BR> <BR> "set" the computer can be divided into two aspects of settings and router settings. .<BR> <BR> Relatively simple computer's settings, click into the "My Network Places" properties, open the "Wireless Network Connection" and then set the "IP address" "subnet mask" and "gateway", as long as the computer's IP .address and IP address of the wireless router can be in the same network segment. ."Gateway" setting to see the card as described in note that, under normal circumstances and the router IP address of the same. .<BR> <BR> Relatively professional setting of the router, more complicated. .First, the system browser, enter the wireless router IP address, the login screen pops up, enter the router's administrator login name and password to enter the setting interface. .At this point the need to check the network service provider to your broadband account and password is correct, if not correct, correct, and try to connect, if the connection still can not open the page into the router, click the "Security Settings" option, see if open ."Network Firewall", "IP address filtering" and "MAC address filter" option, and make corrections and set, remove the fault network can not be opened. .Network attacks lead to abnormal <BR> <BR> <BR> ARP attacks and hacking wireless LAN without fortification has now led to a typical case of a network anomaly. .The negligence of the security settings, and lack of post-security, leading to a small number of malicious hackers with important information and confidential business data caused great harm. .<BR> <BR> ARP attack will cause the network IP conflicts, data loss and overflow, worse, would bring down the network. .These phenomena are all threats to the enterprise network great. .<BR> <BR> First to enter "safe mode with network" in the wireless card property at the replacement of the computer's IP address, then see if you can network. .In addition to purchase and install specialized antivirus software network firewall is more one of the shortcut. .<BR> <BR> Followed into the router, "Security Settings" option for advanced settings. .Most wireless routers now have a WEP password encoding, password use up to 128bit keys to encode data, to communicate on the wireless router, password, key length can select 40bit or 128bit, use a network MAC address and default .ID to restrict wireless LAN and access points which can enter the network, can ensure network security, for the illegal delivery of this, the interception of wireless network signal is very difficult, which can effectively prevent hackers and illegal destruction of .users to malicious network attacks. .<BR> <BR> Finally, note that, in the absence of special needs or does not have the professional skills of the case against open the router's "Remote WEB Management" option. .Some features of the router failure <BR> <BR> <BR> <BR> can not use most of this problem exists in some of the old section of the wireless router, when we advanced features option to configure the router when the connection is correct in the case of repeated confirmation .The following are some of functions not open to use, then you might first think of whether it is hardware out of the failure, it is not. .<BR> <BR> We need to see the version of the router system, access to the wireless router in the manual, to see whether the function supports this version of the router system. .Router system usually has many versions, each supporting different functions. .If your current software version does not support this feature, it should find the appropriate software, the first upgrade. .<BR> <BR> Click to enter the wireless router's "System Tools" option, enter and select the "software upgrade", then in the dialog interface will appear in the current software version and hardware version of the dialog box, enter ."file name" (ie, upgrade the file name) and the "TFTP Server IP" and click "Upgrade" button. .<BR> <BR> Upgrade to the attention of: Choose consistent with the current hardware version of the software upgrade, the upgrade process do not turn off power to the router, the router will cause damage can not be used in the network stability of the upgrade process .The whole process is very short no more than a minute. .When you find a router reboot after the upgrade, do not worry this is normal. .After the general update, the router will be more stable work and for this version to add some more new features..
【 Weak current College 】 AutoCAD six using techniques
1.AutoCAD tabulation
AutoCAD in spite of the powerful graphics capabilities, but the form processing functionality relatively weak, but in practice, often need to make in AutoCAD, such as engineering forms number table, how to efficiently make table, is a very practical problem.
In the AutoCAD environment by hand painting line method to draw a table, and then, then fill in the text in the table is not only inefficient, but it is difficult to precisely control the literal writing position, text layout is also problematic. Although AutoCAD support object linking and embedding, you can insert a Word or Excel table, but on the one hand, modify it is not very convenient, small changes you'll have to enter the Word or Excel, after the modifications are complete, and return to AutoCAD, on the other hand, some special symbols such as the level bar symbols and secondary, reinforced symbol Word or Excel is very difficult to enter, you have the best of both worlds approach, after exploring, you can better address the: first-in the form in Excel, copied to the Clipboard, and then select the AutoCAD environment under edit menu, select as AutoCADEntities Pastespecial, OK, the form is translated into AutoCAD entities, use explode explode, that is, you can edit the line and side characters, very convenient.
2. in the Word document to insert AutoCAD drawing
Word document production, often requires a variety of illustrations, Word drawing capabilities are limited, especially in complex shapes, the shortcomings are more pronounced, AutoCAD is professional drawing software, powerful, well suited to draw complex shapes, using AutoCAD drawing good graphic, and then insert the Word compound document is a good way to solve the problem, you can use the EXPORT function in AutoCAD provides first AutocAD graphics to formats such as BMP and WMF output, and then insert the Word document, you can also copy the AutoCAD graphic to the Clipboard and then paste in the Word document. It should be noted that, due to the AutoCAD default background color is black, while the Word background color is white, the first AutoCAD drawing background color to white. In addition, the AutoCAD graphic into a Word document, often excessive air side, the effects of unsatisfactory. Use Word Picture toolbar's crop function Truing, empty sides too big problem to solve.
3. line width changes
AutoCAD provides a polylines PEDIT command line width changes, to polylines LineWidth modify (if not the polylines, the command will be converted to polylines, and then change the line width), but the PEDIT operation propagation, only select one entity actions, inefficient. AutoCAD
9K; o # D/A4r $ iR14 bonus program Bonus offers mpedit command, for mass modifying polylines line width, very convenient and efficient. In AutoCAD2000, you can also specify the line width to entities (LineWeight) properties to modify the line width, simply select to change the line width of the entity (the entity set), you can change the line width, line width attribute modifications easier, it should be noted that LineWeight property line width of the display screen is determined by the system variable, the variable is LWDISPLAY ON, LineWeight property displayed on the screen width, the variable is OFF, nothing is displayed. Polylines line width with LineWeight can control entities, line width, the difference between the two is that LineWeight line width is absolute line width, and polylines line width is relative line weight, that is to say, no matter how great the graphics to print dimensions, LineWeight line width are unchanged and polylines line width with print size proportional size, command line width to scale LineWeight, both entities have been scaling the number of times that LineWeight line width are unchanged and polylines line width with scaling.
4. Graphics printing techniques
Since there is no printer installed, or want to use other high-end printer enter AutoCAD graphics, need to another computer to print AutoCAD graphics, but the other computer might not install AutoCAD, or due to various reasons (such as AutoCAD graphics in other computer fonts are not displayed correctly, printing over a network, network printing is not working properly, and so on), you cannot use another computer to normal print, this time, you can in your own computer to AutoCAD graphics to print to a file, a printer file, and then, in another computer with the DOS copy command to copy the output to the printer, the printer files, by copy "printer file > prn/b, it should be noted that, in order to be able to use this feature, you need to add anything else in the system specific models printer on the computer, set as default printer, and also, don't forget to COPY back in the final with/b indicates in binary file output to the printer from the printer.
5. Select skills
Users can use the mouse to select the target one by one, select the target of a case-by-case basis to select the set, in addition, AutoCAD provides Window (to type "w" response Selectobject: or directly in the screen from right to left to a rectangular box response Selectobject: prompt), Crossing (to type "C" response Selectobject: or directly on the screen from left to right, a rectangular box response Selectbject: prompt), Cpolygon (to type a "CP" response Selectobject:), Wpolygon (to type "WP" response Selectobject:), and other window mode selectionObjectives, including Window and Crossing for rectangle window and Wpolygon and Cpolygon for polygons, Window and Wpolygon mode only when entities of all parts are contained in the window only when the entity is selected, and in the Crossing and Cpolygon mode, as long as part of an entity is included in Windows, the entity is selected. AutoCAD provides Fence (to type "F": in response to the Selectobject) select entities to draw a polyline is closed, all the lines intersect and entities are selected. In the select a destination, sometimes inadvertently selected the selected destination, then the user can type R to respond to the "selectobjects:" prompt, and then put some mistakenly selected target concentration from select, and then type A, and then add to select the set goals. When the select entity and other entities directly when you can hold down CTRL, and then click the left mouse button, then close together entities, high-brightness display until the selected entity high brightness display, then press the enter key (or click the right mouse button), select the entity. You can also select a condition, use the entity ' filter response selectobjects:, AutoCAD2000, also offers a selection of entities, QuickSelect feature and filter are similar, but more simple and convenient operation. AutoCAD provides choice set construction method features a strong, flexible and appropriate use will enable the mapping efficiency greatly improved.
6. quality properties search
AutoCAD provides point coordinates (ID), distance (Distance), area (area) of the query, to graphic analysis of great convenience, but in practical work, sometimes required to query the entity quality property characteristics, AutoCAD provides solid quality property (Mass, X +] 3d * _ $ Z; E, [
Properties), you can easily query the entity's moment of inertia, area, mass, and other entities, it should be noted that, for the curve, constructed from polylines, you should use the closed region region command will close the regional surface domain, and then do one of the mass properties of the query to query entities of inertia, area moment, entities, attributes such as the center of mass.
【 Weak current College 】 DOS command in Visual FoxPro (4)---Power By 【 China power house network 】
12 .Del
This command is used to delete files. Format:
Del file name
The command to the file name is specified by one or delete all files in a batch. When the file name is *. *, which means to remove the specified path for all files, then Dos will let you confirm whether you really want to delete all the files. If you really want to delete, enter y to enter.
This command does not delete the directory.
This is a dangerous command, be sure to consider before you use it. Example:
1.delmyfile.*
This format is to delete the current directory name is myfile, any file name extension.
2.Delaaa*.exe
This command deletes the current disk's root directory in a subdirectory of the aaa's extensions for all files in the exe.
3.Delaaa*.*
This command deletes the current directory in a subdirectory of the aaa in the file.
4.Del*.*
This command deletes the current directory for all files.
MD-build subdirectory
1. function: create a new subdirectory
2. type: internal commands
3. format: MD [drive:] [path name] page〈 subdirectory name >
4. instructions for use:
(1) the "letter": specify to create a subdirectory of the disk drive letters, if omitted, the current drive;
(2) the "pathname": to create a subdirectory of the parent directory, if the default is built in the current directory.
Case study: (1) in the root directory of drive c to create a subdirectory named FOX; (2) in the subdirectory and then create a FOX USER subdirectories.
C:, > MDFOX (on the current drive c: create subdirectories under FOX)
C:, > MDFOX, USER (in the subdirectory and then create a FOX USER subdirectories)
(2) CD — change the current directory
1. function: displays the current directory
2. type: internal commands
3. format: CD [drive:] [path] [subdirectory name]
4. instructions for use:
(1) If youomit the path, and the subdirectory name displays the current directory;
(2) such as "CD," formatting, you return to the root directory;
(3) if the use of "CD. " Format is returned to the top level directory.
Case study: (1) access to USER subdirectories; (2) to return from a subdirectory to the subdirectory USER; (3) back to the root directory.
C:, > CDFOX, USER (enter FOX USER subdirectories under a subdirectories)
C:、FOX、USER>CD.。 (Back up one level in the root directory)
C:, FOX > CD, (return to the root directory)
C:、>
(3) of the RD-delete subdirectories command
1. function: remove from the specified disk directory.
2. type: internal commands
3. format: RD [drive:] [path] [subdirectory name]
4. instructions for use:
(1) before deleting the subdirectories must be empty, which means that you need to enter the subdirectories, use the DEL (delete file command) to its subdirectory files by deleting the blank, and then return to top level directory, delete the RD command with the directory itself;
(2) you cannot remove the root directory and the current directory.
Example: requires the C disk FOX USER subdirectories under a subdirectories, operates as follows:
Step 1: first USER subdirectory files by deleting empty;
C、>DELC:、FOX、USER、*。 *
The second step, the deleted USER subdirectories.
C、>RDC:、FOX、USER
(4) DIR — displays disk directory command
1. function: displays the contents of the disk directory.
2. type: internal commands
3. format: DIR [drive] [path]
[/W]
4. instructions for use:/P; when you wish to view the directory too much, can not be finished in a screen display screen will roll up straight, not easy to see, together with the/P parameter, the screen will face a display 23 rows of file information, and then pause and tips; Pressanykeytocontinue
Use:/W added/W displays only thefile name, file size and creation date and time you are omitted. Plus parameters, each row can be displayed five file name.
PATH — the path to the Setup command
1. function: device search path for executable files, only the file is valid.
2. type: internal commands
3. format: PATH [letter 1] directory [path name 1] {[; letter 2:], page〈 directory pathname 2 > ...}
4. instructions for use:
(1) when you run an executable file, DOS will first search the current directory to the file, if found; if the running of the file is not found, according to the PATH order, order a set path to the directory one by one to search for the file;
(2) the path in the PATH command, if there are two or more, all paths to a semicolon-separated by ";";
(3) PATH command has three methods:
PATH [letter 1:] [path1] [letter 2:] [path 2] ... (Sets the search path for executable files)
PATH: (cancel all paths)
PATH: (displays the path of the currently set)
【 Weak current College 】 checks your computer has not been hacking Trojan invasion
Normally use the computer may encounter such a situation: computer suddenly panic, and sometimes automatically restart, unprovoked-less files found desktop refresh slowly, is not running any program and the hard disk is hard to read and write to the system or baffling to search for a floppy drive, anti-virus software and firewall alerts, find the speed of the system is more and more slowly, at this time you will have to be careful.
The first reaction (forming a good habit to bowl can reduce loss): use CTRL + ALT + DEL to bring up the task list to see what programs are running, such as find strange program will pay more attention, in General, those in the Task Manager on the program will not run on the system's basic shines into negative impact (Note: here is a basic operation, and they say that this article is on the network, the results of this study), so you can turn off some suspicious programs to see, discover some abnormal situation returned to normal, then it would be the preliminary determination is a Trojan horse, and found that there are multiple names for the same program running, but may increase over time, this increase is a questionable phenomena also pay particular attention, you are to the Internet network or LAN after the discovery of these phenomena, not doubt, hands-on look!, (Note: there may be other virus ascribes)
1 upgrade your anti-virus software to the latest, to conduct a comprehensive inspection system scan.
2 click Tools → Options → view the folder Hide protected operating system files (recommended) and Hide extensions for known file types of the two preceding written removed, for easier viewing.
3 view the Windows directory of the win.ini file that begins with a few lines in the [WINDOWS] load = ren = here on the start Windows automatic program, you can see the contrast between them.
4 viewing the Windows directory in the system.ini file under the [386Enh] line: device = here is placed the systemitself and additional drivers. Plus the driver typically use the full path, e.g., device = c:\windows\system32\tianyangdemeng.exe (here for example)
5 see Start menu 「introduction programs "→" startup 」. Here is start of Windows automatic procedures, if any, it is placed on the C:\Windows\StartMenu\Programs\, keep it in a safe place and then deleted, you need to restore them back.
6 in the start → 「introduction run 」 Type "MSCONFIG" and see if there is any suspicious startup items, you may be asked, does not mean?, in fact, these two methods is different, you are both ways to see what you will find different, as regards the point you want to say more, to be honest, I don't know. Oh don't joke wish master out answers!
7 check the registry, in the start → 「introduction run 」, enter "REGEDIT".
First make a backup of the registry, view the registration. (Be sure to develop a habit, when you modify the wood file, not sure of the need to be backed up)
View the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices and Run, to see if there's a suspicious program.
View HKEY_CLASSES_ROOT\EXEFILE\SHELL\OPEN\COMMAND, look. EXE file associated Trojans, the correct value for "% 1"% * view HKEY_CLASSES_ROOT\INFFILE\SHELL\OPEN\COMMAND, look. INF file association of horse, the correct value for the "HKEY_CLASSES_ROOT\TXTFILE\SHELL\OPEN\COMMAND SYSTEMROOT%\SYSTEM32\NOTEPAD.EXE%1 view to see if there is. TXT file association of horse, the correct value for started CMD, enter%SYSTEMROOT%\SYSTEM32\NOTEPAD.EXE%1 NETSTAT-AN view has no exception for the port.
8Windows in executable file. exe、。 com、。 dll…… They are likely to be a hacker placed virus hacking and virus carriers. When the system is functioning, the above files to make a backup, to the need to write back!
9 in the Windows directory to see if there is no a Winstart.bat file. This file is also an Autoexec.bat like automatic batch file, however, it can only work in Windows and can not be used in DOS. A closer look at what you don't know the driver turned it down, to Baidu check, automatic batch files in general this will not be used. (You can only experience to judge the)
10 see c:\autoexec.bat and c:\config.sys, these two files have some system drivers. To see if there's anything suspicious driver.
11 right-click 「introduction my computer 」 → Event Viewer Security log to see if there are no suspicious content.
12 in CMDNext enter the NETUSER to see if there's a suspicious users set up their own never occurred, immediately NETUSERABCD/DEL to delete it (ABCD is the user name here, just put it into the users you want to delete it, or you can go to the next check user clone for viewing and other things can help to your tool, some hackers set up users with General method is invisible, we will pay attention.
【 Weak current College 】 XP day-to-day application of skills and experience (6)
26. how to hide your desktop icons
In WindowsXP added hide desktop icons, you can simply use the mouse to click the desktop space, in the pop-up menu, select "arrange icons" command, and then under Louisa was always with menu cancel on the "show desktop icons" command of the selected, the system will automatically hide all desktop icons.
If the number of icons on your desktop, you can rearrange the icons in the desktop right-click a blank area, in the pop-up menu select "arrange icons", and then on the next level of menu click of an icon arrangement rules.
Using WindowsXP "Desktop Cleanup" feature, you do not use the icon on your desktop clean up. In the above "desktop" Project dialog box, in the "General" tab, if you select "every 60 days run Desktop Cleanup Wizard" check box, the system will automatically run every 60 days once the Desktop Cleanup Wizard to help you clean up your desktop the icon is not used. If you click the "clear now" button on the desktop, the system will immediately open the Desktop Cleanup Wizard, you cannot use shortcut icons to move to a "unused desktop shortcuts" in the desktop folder. The wizard does not move, change and delete any programs, if you want to add an icon to move back to the desktop, from "unused desktop shortcuts" in the desktop folder restore it.
27, how to enter complex characters in WindowsXP
Using the Microsoft pinyin 3.0 can be traditional exports excellent low mao lies slightly hold up ≡ cheng ⑷ written by rush carbonylation shicong Royal ǎ se ao put doctors ' generation ⒃. letting wake ≈ cuttings Jie Rui ⒎ cons proclaimed packing pen shicong Royal ㄗ thorn chuo-core process should work harder to scrap Jie ⒎ cons words magnetic I ping vest with plain Hill League Xie crab and the development of Pitt Trent shicong change?
Of course there are other more method, it is no longer a detail.
28. How can I find the two computers connected to the icon
Phenomenon: my computer is installed in WindowsXP, surfing the Internet in the system tray when two computers are connected to the small icon disappeared, so I often wonder if online. May I ask how to restore it?
Small icon disappeared because the property settings of the network connection. In Windows98 in dial-up connection to the Internet, the connection of a small icon will automatically appear on the taskbar. If the small icon has disappeared, you can right-click on "my connection", select "properties → settings → options", select "show modem status" can resume. In Windows2000 and WindowsXP, users can control and set the connection icon is displayed and hidden features. Specific method is to open the dial-up connection or network connection properties "dialog of", and then select or clear the "show in notification area when connected check box, the icon" can achieve the icon is displayed or hidden.
29, how to create an automated system recovery disk
Phenomenon: I did not find in WindowsXP, making an emergency repair disk in making the interface, how do I? I of Windows98 every boot prompt for user name and password, how do I remove?
WindowsXP-emergency repair disk accurate name should be "the automated system recovery (ASR) floppy disk", it can back up those boot system required system files. Production: click "start → all programs → Accessories → System Tools", then click the "backup", click Backup tool Wizard, on the "Advanced mode" button. In the "Tools" menu, click "ASR Wizard"; and then follow the on-screen prompts to (Note: prior should be prepared to save system settings for the empty floppy 1.44MB). Use the method is simple: WindowsXP installation CD into the CD drive, restart the computer. In the Setup interface, press F2, the system will prompt you to insert the ASR floppy disk you created earlier (ASR does not restore your data files). Please follow the instructions on the screen of the wizard to automatically recover the system. In addition, even if not "the automated system recovery (ASR) floppy disk", or you can use the "repair" function WindowsXP system boot menu, only certain individuals of special settings will be restored to the default settings, use the "automatic system recovery (ASR) floppy disk" does not.
Windows98 every boot prompt for user name and password, you can press "Esc" key to enter the Windows98 desktop, you can set the password for the Windows directory of the .pwl file *. For example, the username is "qq", the corresponding password file is "qq.pwl", find it and delete it, and then restart the computer, the login window appears, enter the original user name "qq", password is filled in, so you can eliminate.
30, how to automatically turn off the program stops responding
In WindowsXP OS, this setting causes the WindowsXP when logging to a clinic application has stopped responding, you can automatically turn off it, without the need for cumbersome manual intervention. Want to implement this feature, please click the "start → run" enter "Regedit" to open the registry editor, locate the HKEY_CURRENT_USERControlPanelDesktop branch, the key will be AutoEndTasks is set to 1.
【 Weak current College 】 improve network speed excludes cables, ports, loops, and other obstacles
Normally, when a Web site cannot access, network connectivity test is blocked waiting for symptoms, these failures due to have clear phenomenon, we can quickly locate these phenomena, the failed node failure finding it is not very troublesome. However, there is one type of network failures in particular headache that network connection is open, but the Internet connection speed is crazy slow, what factors enable network access speed so slow? actually results in network access is slow in comparison, we only have each troubleshooting, to let the network access connection at full speed!
Excluding cable obstacles
Network access from the physical cable connection, don't think you are using out-of-connection cable, will not be any problems. In fact, approximately half of the network failures and physical cable connection, network cable production and plug connection method, and is closely related to the network transmission performance; for example, if we are using a physical connection cable, do not follow the standard and T568B T568A standard production, then the Internet signal transmission on cable in that section, it is vulnerable to external interference, use that cable Internet access, you can easily encounter network speed fast. In addition, if the network cable contact is not strong, Internet access is also experiencing intermittent symptoms.
So how can I confirm that the Internet is slow, is caused by the physical cable? very often, in order to determine if there is a problem with the network cable, we will which cable is plugged into a working state good laptop for Internet test, if test results are normal, basic to confirm that the network cable is not a problem; in fact, such a judgment is not necessarily accurate, sometimes a not in accordance with the provisions of the network cable, connected to the laptop all normal, but the connection to the normal desktop computer, start Internet speed to normal speed, then very slow, and even can not be normal Internet phenomenon, the reason for this phenomenon occurs mainly laptop comes with NIC device quality is high, and the desktop computer to install the NIC device quality significantly worse than the laptop.
Therefore, when troubleshooting a network cable barriers, we first need to make sure that the network cable must conform to standard and standard T568A and T568B do not meet production standard network cable should resolutely abandon, prevent future Internet generation recessive failure; secondly with professional tools test cable connectivity, if do not have professional test tool, you can use your laptop with a desktop computer, confirm that the network of the comprehensive test cable connectivity is functioning; third, check the network cable length is 100 m, distance from those long physical cable should be as short as possible to prevent future Internet users free to be too long cable circle around to affect the normal transmission on the Internet signal.
Exclude port barrier
Hubs, switches, routers and other devices, LAN or WAN environment in important equipment, the equipment of the port in bulk data information, very prone to a variety of symptoms, such as robustness, port, port lock is dropped down, once these unexpected important port, then the LAN will have a large number of client system is not functioning Internet access or access to the network's speed.
To do this, when there is a local area network for multiple computers at the same time, the Internet is slow when symptoms, we need to an important network device port State inspections; for example, you can login into the admin system, use the show command or display command scan, diagnostic work on each port; if it can't find the failed node, we can try to access the network, with the peak professional network management program view hubs, switches, routers, and other important ports of data traffic, the apparent anomalies in the data flow port to find out, and have been observing their status changes. If these ports data traffic has been great, it is not just a question of port bottlenecks, most likely a similar network in LAN, broadcast storm, the loop is not normal; on the contrary, if these important port data flow just access during peak periods of relatively large, and the usual flow to be able to recover to a normal state, then we will be able to identify these basic port may be the network data flow bottleneck location, at which point we should find ways to increase the port's bandwidth capacity. We can use several methods to do this, for example, can be divided into multiple VLANs, you can adjust the port settings, you can upgrade a network device, you can also install multiple network adapters, and so on, to expand bandwidth capacity size.
Exclude loop obstacles
In the network of small local area network environment, due to the relatively small Internet node, network structure is not particularly complicated, the chance of network loop phenomenon often smaller. However, the larger the network, the network structure of complex environments, often will reserve some alternate network cabling, network administrator, not a little attention to their access to the network, it may cause network loop phenomenon; Furthermore, when more than one switch or hub for stacking connection, also possible to connect a loop, this is because the switch or hub of Uplink ports are often the first Ethernet port share the same transmission channel, when we inadvertently Uplink ports and other Ethernet port is connected to the same client, it will throw loop failures. For example, leads from LAN room a network cable, connect to the second floor of 213 rooms, from 214 213 rooms connected to a room, if this time we are closed from the room of a network connection to 214 rooms, LAN House, Room 213, 214 rooms between network lines, might constitute a network circuit, then the Internet packets are being worked for send and verify operation, eventually causing overall network transmission speed is slow.
In order to avoid networkLoop phenomenon from occurring, we lay the network cable, you must develop good operating practices: each network cable must clearly label affixed, can not alternate lines of places as far as possible not to use, even with a spare cable, be sure to do it well written instructions. When network access is slow, the suspect network loop failure phenomenon, we can first look at alternate cable connection is correct, to confirm an alternate cable connections are correct, and then uses the partition, segmentation, troubleshoot step-by-step.
Exclude virus barrier
Now Internet network virus outbreak, and the dangers of madness is enormous, once encountered network in LAN after virus attacks, the entire network of Internet access speed can be significantly reduced, or even can cause paralysis fault occurs the LAN. Current LAN easily exposed to ARP viruses, poisoning after may have one or more computers do not have access to the Internet, or even a large number of computers that do not have access to the Internet.
Troubleshooting ARP virus barriers, we can use the LAN switch management functionality to quickly locate the infected computers; for example, H3C brand switch, we can enter the switch background management system that performs string command "disdia" to all of the LAN switching port scanning, the scan is finished, we can know what virtual subnet computer ARP viruses exist, while at the same time we are able to view the ARP virus infected PC card physical address, and then we can combine networking information, find specific ARP virus infection of your computer, that computer from the network, isolate, and use the latest version of anti-virus software to be comprehensive and thorough virus killing operations until the virus killing clean before it access to the LAN, believe that such a LAN network access speed can be restored to normal.
Of course, in order to avoid network virus drag Internet speed, we have a computer connected to the network before, made full safety protection work; for example, in a local area network installation hardware firewalls, anti-virus software, on the client operating system upgrade in a timely manner, to regularly install various vulnerability patches, some unnecessary ports, services, run off, and so on.
Exclude storm barriers
Some of the exclusions above, if still unable to improve network access speed, we can try on LAN network crisis phenomena, which are particularly vulnerable, for example, as long as there is network devices on a local area network hardware damage occurs, the network of crisis may occur, it often has a hidden, many people tend to ignore the existence of the phenomenon. In General, as the number of workstations in the LAN are increasing all the time, sent to the network's broadcast packets are also unceasingly increase, once the value exceeds 30% of network traffic, so Internet users can clearly feel the network transmission speed will slow down. And cause network storm the most likely cause is that the network device hardware is damaged, it will continue to send to the network in a large number of broadcast packets, causing broadcast storm phenomenon until the occurrence of complex communication paralysis.
To do this, when find LAN Internet access speed is not working properly, we can troubleshoot LAN for network devices hardware corruption. In this investigation, we can use switch management function, find the port traffic anomalies, after use of replacement equipment or replace port, then click troubleshooting methods. In General, hub, switch, NICs and other equipment most prone to the phenomenon of hardware damage.
【 Weak current College 】 how to recognize the hard drive model code
Now available in a wide range of hard drives, each manufacturer for the respective product number. Generally speaking, the number of the hard disk to determine the technical parameters of the hard disk, such as brand and product family, size, speed, capacity, support of interface types. Here we look at the market mainstream hard drive model collation.
1.
Seagate hard drive model
Seagate hard drives have early gold series, U series and kuyu (Barracuda) series, and other products.
1. Seagate 1 January 1999 the series production of the ATA after hard drive model
The first field: from ST, on behalf of Seagate's identifier.
The second field: 1 characters, that represents the size of the hard disk. 3 representative 3.5 width, 1-inch height
The third field: from 5 characters, it represents the standard size of the hard disk (here represents 17.24GB capacity).
The fourth field: 1 characters, it represents the hard disk speed. 7200rpm hard drive 0 on behalf of any other number at the end (including 1, 2) on behalf of 5400rpm hard drive.
The fifth field: by 1 English characters, it represents the interface type of hard drive support. A representative of UltraATA/Ultra ATA/
ATA/66 (IDE/EIDE) interface; AG on behalf of the ATA interface for laptops; W represents UltraWide
SCSI interface, the data transfer rate to 40MB/s; N represents UltraNarrow
SCSI interface, the data transfer rate to 20MB/s; W/FC representative fibre channel, offering up to 100MB/s data transfer rate, and support hot-swappable.
2. Seagate 1 January 1999 the series later production of SCSI hard drive model
The first field: consists of two English characters, on behalf of Seagate's identifier.
The second field: 1 characters that represent the size of your hard disk. 1 representative 3.5 width; 1.6 height; 3 representative 3.5 width; 1 inch high.
The third field: from 5 characters, it represents the standard size of the hard disk (here represents 18.2GB capacity).
The fourth field: from 1-3 English characters, it represents the interface type of hard drive support and the use of technology. DC representative Differentia/80-pin
SCA Interface; FC representative Fibre
Channel/40-pin
SCA Interface; FCV, similar to the FC has increased the size of the cache; LC low voltage Differential/80-pin
SCA; LC, LCV similar increases the cache size; LW represents low voltage Differential/68-pinWide
SCSI interface; LWV similar LW, but increases the cache size, n represents the SCSI/50-pinNarrow
SCSI interface; ND represents Differential/50-pinNarrow
SCSI interface; W represents SCSI/68-pinWide
SCSI interface; WC representative SCSI/WD representatives 80-pinSCA; Differential/68-pinWideSCSI interface.
3. Seagate 1 January 1999 the production of hard drive models before
The first field: from ST, on behalf of Seagate's identifier. <BR>
The second field: 1 characters, represent the dimension of the hard disk. 1 representative 3.5 inches wide, 1.6 inch high; 2 representative 5.25 inches wide, 1.6 inches tall; 3 representative 3.5 inches wide 1 inch high; 4 representative 5.25 inches wide, the standard height; 5 representative 3.5 inches wide, 0.75 inches tall; 6 = 9 inches wide; 7 representative 1.8 inches wide; 8 represents 8 inches wide; 9 represents 2.5 inches wide, 0.75 inches high.
The third field: from 2-5 characters, it represents the standard size of the hard disk (here represents 9.1GB capacity).
The fourth field: by one or two English characters, it represents the interface type of hard drive support. A representative of the Ultra ATA/
ATA (IDE/EIDE) interface; AG on behalf of the ATA
W/SafeWrite protection interface; DC representative Differential/80-pin
SCA Interface; E represents the ESDI interface; FC representative Fibre
Channel/40-pin
SCA Interface; J represents SMD/SME-E interface; K represents IPI-2 interface; LC low voltage Differential/80-pin
SCA Interface; LW representative of the low voltage Differential/68-pinWide
SCSI interface; n represents the SCSI/50-pinNarrow
SCSI interface; ND represents Differential/50-pinNarrow
SCSI interface; NM represents SCSI/50-pinNarrow
SCSI/Macintosh
Comaptible interface; NV represents SCSI/50-pinNarrowSCSI interface; p represents the PCMCIA (PCCard) interfaces; R representative ST412/RLL interface; S representative SyncronizedSpindle or Synchonous
SCSI; W represents SCSI/68-pin
WideSCSI interface; WC representative SCSI/80-pin
> SCA Interface; WD representatives Differential/68-pinWideSCSI interface; X representative XT
Bus (IDE) interface; Unspecified representative ST412/MFM interface.
The first five fields: from 2 English characters, along with the hard drive comes with PR represents the installed software and hard disk controller.
The sixth field: 1 characters, it represents the hard disk access time. 0 = standard; 1 representative fast. </P>
Second, Maxtor hard disk model
Maxtor hard drive models, and more. Major diamond, excellent (diamond ten generations of future product), diamond three series, model 91360D8, 88400D8, 7120AT, MXL-171, MXT-540AL XT-8760S, LXT-213SY, etc. For the convenience of memory, divide them into three fields:
The first field: from 1-5 characters, it represents a Maxtor hard drive product line identifier. 9 *** x represents the new Diamond
Max (excellent) and DiamondMax
Plus (diamond) series hard drive UDMA/33; 8 * ** x representative CrystalMax and old Diamond
Max series EIDE/UDMA/33 hard drive; 7 *** x represents a number greater than 1 GB IDE hard drive; 7 *** represents less than 1 GB of IDE/SCSI hard disk; 25 ** * representative 2.5 inch IDE hard drive; MXT representative IDE/SCSI hard disk; PCMCIA hard disk MXL representative; Flash represents a PCMCIA
Flash
Memory card; LXT represent IDE/SCSI hard disk; MX representative 3.5 S I C S Ⅱ hard disk; representatives of Panther Px
SCSI hard disk MaxOptix RXT representative;
SCSI hard disk; representatives of MFM, RLL XT series SCSI and ESDI hard disk.
The second field: by three or four characters, it represents the standard size of the hard disk (here represents 13.6GB capacity).
The third field: from 1-3 characters or vacancy, it represents the interface type of hard drive support .Dx representatives supported UltraDMA33 EIDE interface; Ux representative holding UltraDMA66 EIDE interface; Ax IDE or EIDE interface representatives; representatives of ESDI Ex; Sx represents SCSI interface. There are also some model prefix, such as: K016420A and ST019100D, where k represents the hard disk speed 5400rpm hard drive ST representatives; speed 7200rpm
III. kunteng hard drive model
The first field is composed by a QM, it represents kunteng identifier. <BR>
The second field: 1 characters, that represents the size of the hard disk or use of technology. 2 representative 2.5 width; 3 representative 3.5 width; 5 representative 5.25 width; Performance; L P representative on behalf of the use of low-cost technology.
The third field: from 3-5 characters, it represents the standard size of the hard disk (here represents 18.2GB capacity)
The fourth field: 1 characters or vacancy, it represents kunteng hard drive sales territory. R representative products are exported to North America; B representative products are sold all over the world.
The fifth field: by 2 characters, it represents the hard drive product series of kunteng identifier. AL representative A t l a s Ⅱ series; AT representative on behalf of the Atlas series; BF Bigfoot series; CP representative Capella series; representative Fireball CR
CR series; CX represents Fireball
CX series; CY representative BigfootCY series; DA representative Daytona series; EL representative Fireball
EL series; EM representative on behalf of the Empire series; EN; EP representative ProDriveLPS series ProDrive
LPS series; EU representative on behalf of the Europa series; EX Fireball
LPS series; GP represents a Grand
Prix series; HN represents A t l a s Ⅱ series; KA representative FireballPlusKA series; representatives of Atlas KN
IV series; KX representative Fireball
PlusKX series; LB representative Fireball
Lct series; LT represents Lightning series; MU representative ProDrive series; MV representative Maverick series; PI represents the ProDrive
ELS series; PX on behalf of the V I k I n g Ⅱ series; RR representative LPS series; Saturn SA representatives; representatives of Fireball SE series
SE series; SG represents Pioneer
Representative of the SG series; SR; Sirocco series represent FireballST series ST; TB LPS series; the TD representative on behalf of the Atlas
Ⅲ series; TM representative Fireball
TM series; TN represents Atlas10K series; TR represents Trailblazer series; Bigfoot TS representative
TS series; TX representative Bigfoot
TX series; TY represents A t l a s 10 K Ⅱ series; VK representative Viking series; XC representative Atlas
V series.
The sixth field: from 1-3 English characters, it represents the interface type of hard drive support. S represents the SCSI interface; A representative of the ATA/IDE interface; representative S SWCSI
WIDE interface; SWD representative SCSIWIDEDIFF interface; SCA represents SCASCSI interface; LW representative SCSILVD interface; FC representative FiberChannel interface.
Kunteng hard drive ID number on your hard disk, kunteng ID number through which you can learn about the technical parameters of the hard disk.
The first field: by 2 characters, it represents the hard drive product series of kunteng identifier (see kunteng hard drive models in the 5th field).
The second field: by 2 characters, it represents the standard size of the hard disk (here represents 15GB capacity).
The third field: 1 characters, it represents the interface type of hard drive support. A representative of the ATA (IDE) interface; S represents SCSI/50-pin interface; W represents SCSIWide/68-pin interface; D represents SCSIWide/68-pinDifferential interface; L represents SCSIWide/low voltage Differential interface; J represents SCSISCA/80-pin interface.
The fourth field: by 3 characters, on behalf of significance is unknown.
The fifth field: represents the version number of the product. </P>
Note: because kunteng desktop hard drive sector has been Maxtor acquisition, so the above hard disk number sequence is limited to the independent production of the product. </P>
4. Western data hard drive model
Western data on different series hard drives have different naming conventions. </P>
1.Caviar (caviar) and Expert series naming rules
The first field: consists of two English characters, WD representative data (West Western
Digital) identifier.
The second field: from two to three characters, it represents the standard size of the hard disk, as in the preceding example indicates 10.2GB capacity.
The third field: 1 characters, it represents the hard disk speed. A representative 5400RPM; B represents 7200RPM.
The fourth field: 1 characters, it represents the interface type of hard drive support. A representative of the ATA interface. In addition, in order to distinguish between Retail series at the end of the RTL. If WD102BARTL. </P>
2.Vantage series naming rules
The first field: consists of two English characters, WD representative West data (WesternDigital) identifier.
The second field: from two to three characters, it represents the standard size of the hard disk (here represents 18.3GB capacity).
The third field: 1 characters, F represents the Vantage product line.
The fourth field: 1 characters, it represents the interface type of hard drive support. N represents UltraSCSI/Ultra2SCSI50-pin interface; G represents UltraSCSI/Ultra2SCSI68-pin interface; H represents UltraSCSI/Ultra2SCSI80-pin interface.
The fifth field: by 4 characters, it represents the hard disk mode type. 00AS represent the enhanced mode.
3.Enterprise series naming rules
The first field: consists of two English characters, WD representative West data (WesternDigital) identifier.
The second field: 1 characters, E represents the Enterprise product line. <BR>
The third field: by four or five characters, it represents the standard size of the hard disk (here represents 18.31GB capacity).
The fourth field: by 2 characters or vacancy, it represents the hard disk mode type. Vacancies for standard mode; AV represent the enhanced mode.
The fifth field: by 4 characters, it represents the interface type of hard drive support. Note: the same interface type hard disk may have different capacities and have a different number.
5. Samsung hard drive model
1. the new Samsung hard drive model
The first field: by 1 English characters, S represents the Samsung SpinPoint series hard drive.
The second field: by 1 English characters, it represents the Samsung SpinPoint hard drive series. V on behalf of the V series hard drive (speed 5400rpm); W W series hard drive represents the (speed 5400rpm); p represents the p series hard drive (7200rpm speed).
The third field: three characters, it represents the standard size of the hard disk, here expressed 8.4GB capacity.
The fourth field: three characters, it represents the same capacity to arrange the order of the hard disk.
The fifth field: by 1 English characters, it represents the interface type of hard drive support. A representative E-IDE/ATA interface; S representative SCSI2 interface; U UltraSCSI interface; D representatives represent UltraATA-66 interface. "H" indicates that the interface for UltraATA100 "N" indicates that the interface for the "C" UltraATA33 expressed as SerialATA150 interface
2. older Samsung hard drive model
The first field: consists of two English characters, on behalf of Samsung hard drive product line identifier. On behalf of the Samsung SpinPoint VG
V series hard drive; WN represents Samsung SpinPoint
W series hard drive; VA/WA Samsung Advanced on behalf of the V/W series hard drive; WU representative Samsung U-DMAW series hard drives
The second field: 1 characters, 3 represents the dimension of your hard disk to 3.5 inch width.
The third field: three characters, it represents the hard diskThe standard size (here represents 6.48GB capacity).
The fourth field: 1 characters, it represents projectgeneration.W2 representative 1.27G/P; W5 representative 1.6G/P; P V3 represents 2.1G/; V4 represents 2.7G/P
The fifth field: by 1 English characters, it represents the interface type of hard drive support. A representative E-IDE/ATA interface; S representative SCSI2 interface; U representative UltraSCSI interface.
6. IBM hard disk model
The first field: by 1 English characters, D represents IBM's identifier.
The second field: from 2 English characters, it represents the hard drive product line. JA representatives Deskstar series; AL/SA represents Deskstar/Deskstar (SCSI-2FAST) series;
AQ representative Deskstar3 series; CA representative Deskstar4 series;
HE represents Deskstar5 series; HE represents Deskstar8 series;
PE represents DeskstarXP/DeskstarXP (SCSI-2FAST) series;
TT Rep Deskstar16GP/Deskstar14GXP series;
JN representative Deskstar25GP/Deskstar22GXP series;
PT representative Deskstar37GP/Deskstar34GXP series;
TL representative Deskstar75GXP/Deskstar40GV series;
RV representative Ultrastar9LZX/Ultrastar18ZX series;
NE representative Ultrastar18ES series;
MV representative Ultrastar18LZX/Ultrastar36ZX series;
PS representative Ultrastar36LP series; DH/DY representative Ultrastar36LZX series;
RH representative Ultrastar36XP series; KL representative Travelstar4GN series;
BC representative Travelstar6GN series;
YL representative Travelstar8GS series;
CX represents Travelstar10GT series;
CY representative Travelstar14GS series;
AR representative Travelstar25GS/Travelstar18GT/Travelstar12GN series;
MD series represents the Microdrive.
The third field: by 1 English characters, it represents the interface type of hard drive support. A representative of the ATA interface; S and U representative UltraSCSI/UltraSCSIWide/Ultra
SCA/enhanced SCSI/enhanced extended SCSI (SCA) interface; C represents SerialStorageArchitecture contiguous storage system SCSI; L represents fibre channel SCSI interface.
The fourth field: 1 characters, represent the dimension of the hard disk. 3 representative 3.5; 2 representative 2.5 "; 1 = 1 inch.
The fifth field: 1 characters, on behalf of the hard disk speed. 5 representative 5400 Ext.; 7 representative 7200 RPM, 1 representative 10000. But early hard drive eliminates this field.
The sixth field: by 4 characters, it represents the standard size of the hard disk (here represents 13.5GB capacity).
Seven: Hitachi hard drive model
Hitachi (Hitachi) successor IBM hard drive's advanced technology
Since Hitachi combines IBM hard disk sectors, Hitachi will inherit the IBM hard drive technology. We all know that IBM is the biggest global memory, history of many groundbreaking memory technology is for IBM, as the most typical of modern hard disk (i.e., "Wynn" hard drive) in embryonic form was developed by IBM Corporation, and of course later widely used "MR (reluctance)", "GMR (giant magneto resistance)" head and its famous "PixieDust (fairy dust)" technology is developed by the IBM Corporation. Although at present in the domestic market performance in general but its powerful background and strength, who also can not be ignored.
Key tricks Hitachi 180GXP series model identification method
Hitachi hard drives have 180GXP and 7K250 two series, so to distinguish its number is more complex. 180GXP series follows the IBM hard disk number. Its recognition as: "IC + disks size + hard drive height + capacity + interface type + series model + speed + cache capacity"
Simple representation: IC "X, XXX XX, XX, XX,, XX-X", its hard disk serial number can be divided into seven parts.
"IC" represents IBM's products.
The first part of the two "X" represents the shape and size of your hard disk. "35" said 3.5 (88.9 mm), "25" said 2.5 (63.5 mm) hard drive products.
The second part of the "X" represents the height of the hard disk. "L" stands for 1-inch (25.4 mm), the "T" 0.49 (12.5 mm), "N" represents 0.37 (9.5 mm) hard drive products.
The third part of the three "X" represents the hard drive capacity, the unit is GB. If the "180" is expressedThe hard drive's capacity for 180GB, "080" is 80GB.
The fourth part of the two "X" represents the hard drive interface type.
"AV" expressed as ATA interface
"UW" represents the interface for Ultra160SCSI68-pinWide
The "UC" represents the interface for Ultra160SCSI80-pinSCA
"XW" represents the interface for Ultra320SCSI68-pinWide
"XC" represents the interface for Ultra320SCSI80-pinSCA
"F2" expressed as FC-AL-2 (2Gbit) interface
The fifth part of the two "X" indicates that the hard drive product series models. The "ER," said Deskstar60GXP series, "VA", "said Deskstar120GXP series V2" said Deskstar180GXP series.
The sixth part of the two "X" indicates that the hard disk rotational speed, RPM/min is the unit. His "04" represented as a 4200RPM/min, "05" is expressed as a 5400RPM/min, "07" represented as a 7200RPM/min, "10" represents as 10000RPM/min, "15" is expressed as 15000RPM/min.
The seventh part of the "X" indicates the capacity of the hard disk cache, from Deskstar180GXP. "0" indicates that is 2 MB cache, "1" represents as 8MB cache. Which use a disc of 60GB product cache is 2 MB, uses two platters of 80GB and 120GB product cache has two 2MB and 8MB, use three disc of 180GB product cache are purchased for 8MB, should pay attention to distinguish.
IC35L180AVV207-1 "," this code as an example, we can know the hard drive number is IBM company 3.5, high 1 inch hard drive, its total capacity as 60GB, using UltraATA interface, a series of products, Deskstar180GXP speed is a 7200RPM/min, with 8 MB of cache.
Key tricks Hitachi 7K250 series model identification method
Hitachi 7K250 series is the introduction of new Deskstar180GXP. Its performance than previous products better, but the hard drive number has changed, causing confusion. Here we have to look at Hitachi 7K250 series hard drive number.
7K250 series number dimensioning as "HDS + speed + series of maximum capacity + the product capacity + product series code + hard drive height + interface type + cache".
Simple is expressed as: HDS "XX XX, XX,, X, X, X, X, XX," hard disk number can also be divided into eight parts.
"HDS" expressed as Hitachi (HITACHI) Deskstar series hard drive products.
The first part of the two "X" represents the hard disk speed. If the callout is "42", "54", "72", "10"; "15", etc, then this drive's speed 4200RPM/min respectively, 5400RPM/min, 7200RPM/min, 10000RPM/min, 15000RPM/min.
The second part of the two "X" represents the product range of the maximum capacity, measured in GB. "25" means the maximum capacity of 250GB.
The third part of the two "X" is represented as a hard drive capacity, the unit has a GB or 10GB. For example, "80", "says 80GB 25" means 250GB.
The fourth part of the "X" represents the hard disk of algebra. Now all 7K250 series is the letter "V".
The fifth part of the "X" represents the height of the hard disk. Here and the IBM number is the same.
The sixth part of the two "X" represents the interface type of the hard disk, the "AT" and "ST". Its behalf for UltraATA100 interface and SerialATA150 interface.
The seventh part of the "X" indicates the capacity of the hard disk cache, there is a number "2" and "8". Their behalf is 2 MB cache and hard drive product 8MB cache.
Eighth part of the "X" is the hard disk retention values, being a number "0".
The Hitachi 7K250 series "HDS722525VLAT80" hard disk number for example, we can know it belongs to a 7200RPM/min, maximum capacity 250GB and total capacity of 250 GB hard drive, 1 inch, is UltraATA100 interface and owns 8MB cache.
【School】 word weak drawing skills Daquan.
<br> <BR> 1. repeatedly use the same drawing tools <BR> <BR> general, click a drawing tool to draw the corresponding graph, but only used once. .If you want to use the same row multiple drawing tools, drawing tools available in the corresponding double-click on the button, then press the button has been in a state, when you do not need this tool, you can mouse-click or press "ESC" key. .If you then switch to another tool to be used directly click the Tools button, while the release of the original multiple-use drawing tools. .<BR> <BR> 2. Painting techniques <BR> <BR> Word2000 arrow drawing tools available are not directly used to draw arrows, but by changing the format of graphic objects can easily draw the arrow. .First, draw line segments using the line tool, click the selection of the segment, the following three methods can be activated "Graphics Object" dialog box: First in the "Format" menu in the implementation of "drawing object" command, and second, the mouse-line segment .on the move, when the mouse into a symbol of the four arrows, double-click the left mouse button and the third is the segment on the mouse move the mouse into the four arrow symbol, click the right mouse button, select the shortcut menu "Settings .Graphic Object Format "option. .Activate the "graphic object" dialog box, you can set the arrow in the dialog box style, width, length and can preview the effect. .Another method is the selected line drawing tool bar and click the "linear" button, you can choose the line with arrows, but can not directly change the arrow style. .<BR> <BR> 3. <BR> <BR> Skills to draw straight lines if you want to draw horizontal, vertical or 30,45,75 degree angle line, after one end is fixed by holding down the Shift key drag the mouse ., drag the mouse up and down, there will be several lines above options, right after the release the Shift key. .<BR> <BR> 4. <BR> <BR> Painting techniques arc Shift-drag the mouse to draw the 45 degree arc, hold down the Ctrl key to draw from the starting point for extension to both sides arc .while holding down the Shift key and the Ctrl key to draw from the starting point of 45 degrees to both sides arc extension. .Determine the distance the mouse to drag the length of the arc, drag in the direction determined the direction of the opening arc. .<BR> <BR> 5. <BR> <BR> Skills draw a rectangle Shift-drag the mouse will draw a square, hold down the Ctrl key to draw one from the starting point for expanding to the surrounding rectangle while holding down the Shift .key and the Ctrl key to draw from the starting point to expand around the square. .<BR> <BR> 6. <BR> <BR> Painting techniques oval hold Shift key to draw a regular circle, hold down hold down the Ctrl key to draw one from the starting point to expand around the oval, and press .live Shift key and Ctrl key to draw from the starting point is to expand around the circle. .<BR> <BR> 7. Text box and the vertical exchange <BR> <BR> text box text boxes and the vertical difference between the text box arrangement of the text box, in fact, no matter what kind of text box, select .in and click the right mouse button on the shortcut menu, select "Text alignment", can change the arrangement of text, text boxes and vertical in order to achieve the exchange of text boxes. .<BR> <BR> 8. Graphical object selection technique to select all graphic objects <BR> <BR> available "Ctrl + A", if not select all the graphic objects, should be the first on the Drawing toolbar click the "select the graphic object ."button to select. .Select multiple graphical objects by holding down the Shift key, one by one with the mouse to select the desired object. .<BR> <BR> <BR> <BR> <BR>.
【 Weak current College 】 how to edit mathematical formulas in Word
As we edit technical documents, often used many mathematical formulas, use the usual methods in Word to insert a mathematical formula in the article goes through the following a few steps: click on "insert" command;/object "object" dialog box opens, select "new" label; in "object types" list box, select the "MicrosoftEqution3.0", and then point the dialog's "OK" button to open the formula editor. Often this edit formulas can be time consuming, and very tired, by reference to some documents, trial and error, and finally found an easy way out, now, hope you can get rid of edit formulas to you.
Our ultimate goal is to put the Word Equation Editor into a button on the toolbar, which greatly simplify this type of operation. Specific methods are as follows:
Click the menu "Tools/Customize" command, open the "Customize" dialog box, select "toolbars" dialog box, and then click the label dialog box to the left of the "new" button to open the "new toolbar" dialog box; in the dialog box "toolbar name" text box, enter a custom name (such as the "formula"), and a valid range in the "toolbar" drop-down list box, click on the "Normal" (General Templates), and then point "OK" to close the dialog box "new toolbar". On the establishment of a "formula" Customize toolbar "formula" toolbar button is displayed on the screen. You can turn it into the Word toolbar you see fit.
In the "custom" to open "commands" tab, in the "category" list box, select the "insert" in the "command" list box, select the "Equation Editor"; "Equation Editor" surrounded by the blue bar, drag it to the newly established "formula"
Toolbar button.
At this point, the formula editing tool button is made out, if you want to make the button and the display name more intuitive, you can further modify it's display name. That is in the "custom" dialog box under the "commands" tab, then select custom "formula" tool button; then the "custom" dialog "change selection" button, click on it will appear a submenu; move the submenu of the "naming" the contents of the text box to "Equation Editor" and click the submenu of the "always uses text", and finally click on the window "close" button.
At this point, the Word toolbar has a display as "Equation Editor" tool button, next to write a formula by clicking on this button.
Weak current College】 【file protection solutions.
<br> <br> This may be because you have deleted some files, as long as the Group Policy settings can be made in it: click "start, Üí run", type "gpedit.msc" and then expand the "computer configuration ., Üí management template, Üí system, Üí Windows file protection ", and then double-click" settings file protection scan "and set it to" disable ". <br> I follow these steps to turn off file protection <br> 1. .click on the start-> run, type regedt32 and carriage returns; <br> 2. find the [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / WindowsNT / CurrentVersion / Winlogon]; <br> 3. in the right pane, right-click the .select New -> DWORDValue named for its SFCDisable; <br> 4. enter in the Hexadecimal values for under ffffff9d to close the WFP; <br> 5. restart the system for the changes to take effect <br> But to the .third step is found in the right pane of the options is not new, is not it! <br> Description: <br> The settings you can control whether you want the system to open the file protection feature that is (SFC) it can .monitor Windows system files every time the system starts. We can modify the registry free control file scanning parameters. <br> Operation: <br> <br> Open your "Registry Editor". Then locate the [HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT .\ CurrentVersion \ Winlogon] this subkey. In the right window to create a "double-byte value" and "SFCScan" and then modify its value to 0 = disabled, 1 = boot time scan, 2 = scan once. <br> Exit .the registry editor "logout" or restart your computer, you will see the change. <br> WindowsXP and 2000 includes a feature called WFP (WindowsFileProtection, Windows file protection) technology. Put the SFCDisable "keys of the key value is set to" .disable WFP ffffff9d ", which is set to" 0 "you can enable it. Other available values are as follows: <br> 1-disables, but when the system startup asks you whether to re-enable <br> 2-only after .the next reboot when disabled, it will not ask you whether to re-enable <br> 4-enabled, and a pop-up window is not displayed <br> Ffffff9d-completely disable <br> Restore the protected Windows system file: in .the Run dialog box, type Sfc / scannow, and then click OK <br> <br> The quiet with sfc / wfc shield off on OK <br> Scanning tools SFC <br> <br> This tool automatically scans all protected system files ., and use the correct version to replace the incorrect version. Part of the operating system is damaged, you can use to recover the system. <br> <br> SFC command line and its parameters are as follows: <br> SFC [/ .scannow] [/ scanonce] [/ scanboot] [/ cancel] [/ enable] <br> [/ purgecache] [/ cachesize = x] [/ quiet] <br> / SCANNOW: immediately scan all protected system files and settings. .<br> / SCANONCE: next post scan only once all the settings protect system files. <br> / SCANBOOT: every startup, scan all protected system files and settings. <br> / CANCEL: cancel all pending protection settings in the scan of .the system file. <br> / QUIET: does not prompt the user to directly replace all incorrect file versions. <br> / ENABLE: enable Windows file protection, facilitates general operation. <br> / PURGECACHE: delete file cache, and immediately .scan all file systems with protection. <br> / CACHESIZE = x: set the file cache size. <br> <br> <br> <br>.
Subscribe to:
Comments (Atom)