Friday, May 20, 2011
Weak current College】 【classic Ghost full application skills is 20.
<br> <br>】 【Printer brief <br> A DOS of the parameters is not strange, DOS, many programs have parameters, although the letter is boring, but the functionality is very powerful. Ghost is a typical support parameters for DOS .programs that take full advantage of its parameters, we can better control the Ghost. <br> A DOS of the parameters is not strange, DOS, many programs have parameters, although the letter is boring, but the functionality is very powerful. Ghost is .a typical support parameters for DOS programs that take full advantage of its parameters, we can better control the Ghost. Let them better to work for us, the previous example, we use the Ghost of parameters to make a card with automatic backup and restore hard .drive data since the start CD. It is because of numerous Ghost parameter, powerful, we need to put some of the most commonly used parameter lists for your usual reference use. <br> <br> Small tip <br> <br> ★ .Parameter (Parameter) is a program to provide us some hidden options by adding parameters, you can achieve a normal startup procedure cannot be achieved or can achieve, but it requires many steps can be achieved for functions, you can give us a lot of convenience .. <br> <br> ★ Parameters and procedures, parameters and arguments are separated by space characters. <br> <br> ★ We can leave the Ghost of parameter to write to some of the BAT file, and pass the control statement to .use it more easily clone and restore our system. <br> <br> 1. the disk to disk copy <br> <br> Graphical interface: DiskToDisk <br> <br> Parameter example: ghost-clone, mode = copy the .src = 1, dst = 2-sure-fx <br> <br> Parameters of function: copy the entire contents of a disk to disk 2, do not have to ask, after exit Ghost. <br> <br> 2. .put everything on the disk backup into an image file <br> <br> Graphical interface: DiskToImage <br> <br> Parameter example: ghost-clone, mode = dump, src = 1, dst = d: \ Win98sys.gho- .z3-sure-fx <br> <br> Parameters of function: backup machine first of all content on your hard disk to another hard drive d: \ Win98sys.gho file, high compression, do not have to ask, after exit Ghost. .<br> <br> 3. recovery from a backup image file to disk <br> <br> Graphical interface: DiskFromImage <br> <br> Parameter example: ghost-clone, mode = load, src = d: \ Win98sys. .gho, dst = 1-sure-fx <br> <br> Parameters of function: from backup to a second hard drive image file recovery to d: \ Win98sys.gho first hard disk, do not have to ask, after exit Ghost. .<br> <br> 4. partition to the partition copy <br> <br> Graphical interface: PartitionToPartition <br> <br> Parameter example: ghost-clone, mode = pcopy, src = 1: 1, 2: 1 - .sure-fx dst = <br> <br> Parameter function: copying the first hard drive first partition on the second hard drive on the first partition, instead of asking, after exit Ghost. <br> <br> 5. the partition content .backup into an image file <br> <br> Graphical interface: PartitionToImage <br> <br> Parameter example: ghost-clone, mode = pdump, src = 1: 1, dst = d: \ Win98sys.gho-z9-sure .-fx <br> <br> Parameters of function: back up the hard drive first partition to d: \ Win98sys.gho, the highest compression rate, do not have to ask, after exit Ghost. <br> <br> 6. .from the backup image file to the clone to partition <br> <br> Graphical interface: PartitionFromImage <br> <br> Parameter example: ghost-clone, mode = pload, src = d: \ Win98sys.gho: 1, 1: .1-sure-fx dst = <br> <br> Parameters of function: d: \ Win98sys.gho first partition in memory clone to a hard disk the first partition, instead of asking, after exit Ghost. <br> <br> .7. parallel port cable directly connected PC client <br> <br> Graphical interface: LPT / Slave <br> <br> Parameter example: ghost-lps <br> <br> Parameters of function: start client (two computers must also .implement Ghost). <br> <br> 8. parallel port cable for direct connection service machine <br> <br> Graphical interface: LPT / Master <br> <br> Parameter example: ghost-lpm-clone, mode = dump ., src = 1, dst = c: \ Win98sys.gho-sure-fx <br> <br> Parameters of the function: the service machine first hard drive back up the contents of the file to the client, without c: \ Win98sys .. gho asking, after exit Ghost. <br> <br> 9. hard disk directly betweenAdd clone <br> <br> Parameter example: ghost-clone, mode = copy the src = 1, dst = 2-sure <br> .<br> Parameters of function: in internal mode copies the first hard drive to a second hard drive, without prompting, direct cloning. <br> <br> 10. network backup <br> <br> Parameter example: ghost-nbm- .clone, mode = dump, src = 2, dst = c: \ xxxx.gho <br> <br> Parameters of function: connect by NetBIOS mode is ghost \ slave network remote PC and backup native second hard drive to the remote hard disk .C: \ xxxx.gho into a image compressed file. <br> <br> Small tip <br> <br> The remote client must use ghost-nbs command to start. <br> <br> 11. cloning an image file .to your hard drive <br> <br> Parameter example: ghost-clone, mode = load, src = e: \ savdsk.gho, dst = 1 <br> <br> Parameters of function: read E: \ SAVEDSK.gho .file and put it to a hard drive cloning. <br> <br> 12. the second partition backup as image file (restore) <br> <br> Parameter example: ghost-clone, mode = pdump, src = 1: 2 ., dst = g: \ imgs \ part2.gho <br> <br> Parameters of function: backup to a hard disk of the second partition to g: \ imgs \ part2.gho image files. <br> <br> Parameter example .: ghost-clone, mode = pload, src = g: \ imgs \ part2.gho: 2, dst = 1: 2 <br> <br> Parameters of function: loading (recovery) of the image file in the second partition to .the internal hard disk, a hard disk of the second partition. <br> <br> 13. copy a different hard drive different partitions <br> <br> Parameter example: ghost-clone, mode = pcopy, src = 1: 2 ., dst = 2: 1 <br> <br> Parameter function: copying the first hard drive partition of the second to a second hard drive first partition. <br> <br> 14. to restore to a second hard drive and adjust the .partition size <br> <br> Parameter example: ghost-clone, mode = load, src = g: \ imgs \ 2prtdisk.gho, dst = 2, sze1 = 60P, sze2 = 40P <br> <br> Parameters of function .: Clone g: \ imgs \ 2prtdisk.gho image file to a second hard drive, and the whole by 60% and 40% of the size distribution of the partition size. <br> 15. to restore to a hard disk and adjust the .partition size <br> <br> Parameter example: ghost-clone, mode = load, src = e: \ imgs \ 3prtdisk.gho, dst = 1, sze1 = 450M, sze2 = 1599M, sze3 = 2047M <br> <br .> Parameters of function: Clone e: \ imgs \ 3prtdisk.gho image files to a hard disk, and the whole partition size is: first partition 450MB, second partition 1599MB, the third partition 2047MB. <br> <br> 16. retention .of the first partition is not assigned to other <br> <br> Parameter example: ghost-clone, mode = copy the src = 1, 2, dst = sze1 = F, sze2 = sze3 = V, V <br> <br .> Parameters of function: copying has three partitions of a hard disk to a second hard drive and keep the first partition of the same size as the source, but other partition free space reserved is not assigned. <br> <br> 17. to .restore to the last partition and adjust the partition size <br> <br> Parameter example: ghost-clone, mode = load, src = g: \ imgs \ 2prtdisk.gho, dst = 1, szeL <br> <br> Parameters .of function: loading an image file to disk last partition and in accordance with the capacity to revamp its size, the first partition is to use the remaining space. <br> <br> 18. from the parameter file read <br> <br .> Parameter example: GHOST.EXE @ (parameter file) <br> <br> Parameters of function: GHOST command line parameters from the parameter file read and execute (note the parameter file is a text format). <br> <br> .Small tip <br> <br> In the parameter file can be written in text format contains any Ghost command line parameters, in addition to-AFILE = and-DFILE = parameters. <br> <br> 19. backup and automatic segmentation < .br> <br> Parameter example: ghost-sure-clone, mode = pdump, src = 1: 1, dst = system.gho-span-split = 630 <br> <br> Parameters of function: it is the first hard .drive first partition information back to the current folder system.gho, if generated system.gho greater than 630MB, segmentation, GHO file generated by this parameter to backup large partition, and burn them to CD-r 650MB on it very useful. <br .> <br> 20. backup and encryption <br> <br> Parameter exampleChild: ghost-sure-pwd, 666888-clone, mode = pdump, src = 1: 1, dst = system.gho <br> <br> Parameters .of the function: the statement is the first hard drive first partition information back to the current folder system.gho, and after the build 666888 GHO file password for encryption. After using Ghost recovery system.gho file, or to release the GhostExplorer file, .you must enter a password, you cannot recover or release files, which can play a role of confidentiality. If you enter ghost-sure-pwd-clone, mode = pdump, src = 1: 1, dst = system.gho, ie- .pwd behind without a password, the Ghost in production before the GHO file will ask the user to encrypt the password, you GHO must remember it well. To the GHO file encryption, others will not be able to easily view or restore the file. < .br>.
【 Weak current College 】 describes server secure hotspot 12 skills
Now the Server stored information more and more, but also more and more primary servers for the prevention of accidents or accidents caused massive attack, mainly in loss of data, the server will use many of the major general security skills to ensure its security. The following describes some of the main server security hot skills.
1.iSCSI skills
ISCSI skills is a new type of storage security skills, the skills of existing SCSI interface and Ethernet network (Ethernet) skills, so that the server can be used with the use of IP network storage device to exchange information. The skills not only prices are generally used by the industry standard for FibreChannel, and system administrators can use the same device to manage all of the network, and do not need to additionally equipment to perform network management.
ISCSI skills by IBM research and development of the two main agencies — California Israel Haifa Research Center in Almaden and common development, is a hardware device application, you can run IP protocol upper SCSI command set. Basic, iSCSI can achieve over IP networks, run the SCSI protocol so that it can in areas such as high speed Gigabit Ethernet implementation of routing. Now, many network storage provider committed to SAN (StorageAreaNetwork, storage area network) usage of fibre channel set to a practical standards, but its structure to the high capital costs, this is not an ordinary enterprises can afford; in contrast, NAS skills while inexpensive, but limited by bandwidth consumption, you cannot complete the mass storage and system difficult to meet the requirements of openness. The use of iSCSI skills in above two has been set up between the bridge. ISCSI skills are based on the IP protocol skills standards for SCSI and the TCP/IP protocol to connect to a LAN for network users, only need to do more investment, you can easily and quickly to the information and data to perform interactive transmission and management. Although iSCSI-based IP protocols, but have centralized SAN bulk open storage's quality. This skill information for side to face up to the high speed growth, on the other side was in the "data islands" of many small and medium-sized enterprises will undoubtedly has great appeal.
2. automatic backup skills
The skill is in network systems set up two identical and synchronization of file server, if one fails, another will now automatically access system to replace the failed all of the file server. By applying the skills, you can ensure that fault-tolerant system data information in the system or human error caused the damage or loss, the timely implementation of the data in the local high speed recovery; in addition, the skills can ensure fault-tolerant systems in times of unpredictable or against regional disasters (earthquakes, fires, machine destruction, etc.), the time in local or remote data and the entire system of disaster recovery.
3. transaction tracking skills
The skills for database and multi-user software needs to be designed to ensure that the database and multiple users use the software in all of the processing work is not over yet, or when a workstation or server occur suddenly damaged, be able to keep data consistent. Their works: for the specified transaction (action) or a complete, or what actions are not performed.
4. automatic testing skills
Generally speaking, an incorrect or damaged data before reverting, you must have the ability to timely notice that cause these incorrect reasons, therefore, a complete fault-tolerant systems should be can't support automatic inspection skills. Automatic inspection skills are used in troubleshooting high-speed detection of an effective means, especially with full self validating properties of self calibration device, not only to check the time out of the system modules, also able to detect the error itself. In the design of a fault-tolerant system, if the correct use of automatic testing skills, can significantly improve system responsiveness against errors, the errors of the incubation period is shortened, effectively preventing the further spread of incorrectly, thus it¡¯s helpful for other skills to function in a timely manner is not correct to make the correction.
5. memory error correction skills
This skill is a server error correction transparent test and fault, it found that the skills and correct a memory is not correct, you can trick or treat data bits from the RAM is erased, thereby effectively reduce cannot be corrected by a number of incorrect.
6. thermal positioning skills
The skill is also a kind of check data incorrect skills, the skills can be written to the hard disk of data to perform some check comparison work, thereby determining just read data can not be incorrect or could not have any other queries. In comparison to perform maintenance work, the skills can be put in automatically from the hard disk has just written data read out with the original data in memory to perform the comparison. If there is incorrect, the application in an opened within the hard drive is called "thermal positioning reroute zone" of the area, the hard disk bad area recorded and will be determined by the data in a bad area with the original data is written to the thermal positioning reroute the area.
7. automatic restart skills
Automatic restart of skills means PC server can not manage to complete restart process, in an extremely rapid recovery system running.
8. network monitoring skills
This skill enables users in one common client to monitor all use of the network server, monitor, and determine the server can not be "healthy" and once the server chassis, fans, memory, processor, system information, temperature, voltage, or third-party hardware of appear incorrect, it will alarm management. It is worth mentioning that the monitoring of the client and server side of the network canA LAN or Wan, directly through the network to the server to perform start, turn off or reset bit, great place is the management and maintenance work.
9. the failure of online correction skills
Failure of online correction skills including faulty parts pluggable and part of the online configuration skills. Pluggable components have a hard disk, memory, peripheral cards, power supplies, fans, current PC server to be proud of the skills are PCI Hot plug. Modular design will be the future direction of development.
10. file allocation tables and directories table skills
Hard disk file allocation tables and directories table stored file in the location on your hard disk and the file size, and other information, if it fails, the data is lost, or mistaken as to the other file. By providing two same file allocation tables and directories table, put them in a different location, in the event of a failure, the system will make a prompt, thereby achieving fault tolerance purposes.
11.VersaStor skills
The skill is the Compaq computer company in the data storage, it is one of the masterpieces of the biggest bright spot is the first realization of the concept of network storage pool to eliminate the present widely exists in different storage system boundaries, so that you can in a different storage system to perform easy storage and management. In addition, the storage pool capacity can also be based on different servers and use the programs dynamic and transparent scaling, support for different server data for seamless, transparent and portable. VersaStor skills can be any one of the network connection with SAN storage system provides online storage space acquisition and storage, regardless of the manufacturer; and the skills simplifies the deployment of storage systems, storage management consists of General machinery labor performance to a higher level.
12.AutoRAID skills
This skill is a combination of the advantages of different RAID multilevel RAID arrays for the skills that will last use of the data placed in storage by RAID0/1 of high-speed and high-performance hard drive, the less frequently used data in RAID5 storage of cost-effective hard disk. With AutoRAID, system installation, configuration, and extensions become basic and easy, this ability is no longer need the data to be transferred to other hard disks in the array, simply install the new hard disk, you can automatically AutoRAID determines the size of the hard disk, and it isn't hard disk array; the system will use the new hard disk space, and more data in RAID0/1 storage to improve system performance and speed of access. In addition, AutoRAID can manage different capacity hard disk consists of the hard disk array.
【 Weak current College 】 antivirus slowing down computer causes and treatments
Antivirus slowing down computer causes
Antivirus software needs to be in memory or look for virus signature file. This is a huge amount of computation, low profile machine speed impact is obvious.
In addition to CPU resources, the anti-virus software will need to run the program, the file open/save time for additional disk read operation. Frequent hard disk read blocking other processes and virtual memory of your hard disk read and write operations, making the CPU and the machine must be waiting, thereby holding back for a machine.
(In process management overhead? please know friends added)
Optimal use of anti-virus software
Eliminate unnecessary scan operation
There will be no threat of files to exclude from the scope of the scan checks, will greatly reduce the antivirus software on the system pressure and delay, and improve overall operating efficiency.
Because not all files can cause the spread of viruses; at the same time, even if the computer has a virus of the original data, it also needs to be running the opportunity may be activated. Thus, under normal conditions, the following should be excluded from the scope of killing the antivirus software:
Compress documents: * .zip .rar/*/*/* .cab .gz
Note: If the compression package really viruses, they are only in the extracted may be running. In the extract, realtime protection antivirus software has to be clean, compact package with a virus and will not cause harm.
Because of the extract is high intensity calculation process, therefore cancel the scan compressed files will effectively reduce the CPU usage of antivirus software.
QQ chat: * .db
QQ chat, this data file is repeatedly modified, thus also be anti-virus scanning repeatedly, seriously affecting the hard drive performance. This type of file is not a virus, don't cancel the scan when more pending! (* .db is also possible that other software's database files)
Large media files: * .wav .mp3/*/*/* .bmp .tif
These huge media file is not a virus. Cancel their scanning can accelerate the speed of the open folder.
*.ttc/*.ttf/*.txt
These files can be excluded from the scan, but is not a major problem. More work needs to be excluded data can search your hard disk > 2 MB file, depending on the circumstances excluded (for example you are the artists, you might also need to be * .psd excluded).
Reduce manual scans
All scan all disks will spend a lot of time, usually no need to do so.
In General, scan the system disk, other spare ProgramFiles directory, download software, storing them in the directory. Typically, if a virus, in most cases, one or two minutes you will have to reflect the (usually scan the windows directory on alarm).
If you feel there is an exception, then the machine and a full scan.
Security expert usage
That is, use the previous method, the anti-virus software will still cause the system speed. Antivirus capability higher users tend to have their unique usage.
Intermittent virus checking
Many experts usually does not turn on antivirus software, are only used when exceptions to check them.
Ordinary users can learn the practice, generally without anti-virus software, every couple of weeks set out idle time scan. In this way, the usual computer speed is guaranteed.
The truth is: episode too soon or ** large vicious viruses can cause particular concern, thus affecting dissemination; but mild virus, spread the opportunities even greater. As a rule of thumb, computer data in one or two weeks by virus seriously ** is unlikely, therefore, that the above-mentioned intermittent antivirus method.
Need a reminder about are:
Even if you turn on the best protection measures, important data backup is necessary!
And antivirus software, firewall best always.
With system monitoring tools replace the virus checking
If you are on your own computer is very confident that may wish to turn off antivirus software. Usually only often enable Task Manager, System Monitor taskinfo software view health, is an exception and then start the antivirus software to check. This approach eliminates the huge overhead. anti-virus software
Avoid using multiple antivirus software
Multiple anti-virus software at work, not only slow, system also may deadlock, crashes, and between competing for the system of control over the antivirus software.
If you want to use multiple anti-virus tools to guarantee system security, please note that while only one in the work.
In addition, the data show a lot of antivirus software is installed at the same time (not run) has already begun "many elephants are charging", such as "destroyer" discovery system equipped with Kaspersky Anti-virus will refuse to install, uninstall some antivirus software may cause other anti-virus software stop working or an exception occurs. (If you find that the antivirus software conflicts, in the page document your experience)
【 Weak current College 】 [posted] tell you Duo not known of the five areas
Now everyone knows Duo. People mention it is multi-tasking, multi-threading. However, eating this bowl of hot meals, we have to calm down, don't. Small series is to introduce you to easily overlooked details, or easily misunderstood. Want to help.
1. either Intel or AMD is not the first company to launch dual-core processors.
In fact, as early as 2001, IBM introduced its first dual-core Power4 processor. IBM was used in its RISC server. While AMD and Intel in 2004 when we plan to launch dual-core processor, in 2005, they launched a dual-core processors respectively. AMD and the 2005 21 April officially launched the AMDOpteron processor (used with the server and workstation), AMD Athlon64X2 Duo (for home and business users). While Intel is in the 2005 11 April launched their Pentium processor.
2. dual-core processor by the technical side, is inevitable.
Single-core processors to achieve better performance with faster processing speed, you need greater capacity, more strong thermal conditions. In fact in 2005, Intel cancelled production 4.0GHz "Tejas" single-core processors. Because they found that frequency to achieve this, it's driving voltage must achieve 100W. Moreover, to ensure its normal operation should have a temperature control, you need a larger radiator. But people need and not with the increasing the voltage of methods to increase speed.
The duo will be the best answer. Dual-core performance will undoubtedly have a new single-core, rather than the processor. This is the British Cole and AMD Launches dual-core processor-the real reason.
3. the ratio is not a clock frequency, but the overall performance of the
If you think that the duo have the fastest clock frequency, it is mistaken. If you only focus on the processor clock frequency, so you can choose Intel Pentium4 processors, model 670, its clock frequency is 3.8GHz, Pentium4660, clock speed is 3.6GHz. In dual-core, mainstream PentiumD820, its clock frequency only 2.8GHz. Compare with solo in the fastest processor frequency.
But with the same frequency is 2.4GHz Athlon643400 + and dual core Athlon64X24600 + contrast. After testing, the duo's performance improves. Duo's overall performance is the solo 1.4 times to 1.8 times.
4. dual-core related aspects
After investigation of domestic users, 48% of PC users do not understand what is dual core. 42% of people who think they know that the dual-core, 10% of people think they know what a duo; 52% of the people know it technology; only 12% of the people understand that the dual-core system. Market researcher Frost and Sullivan found in desktop processors, notebook and server processor market, there will be 15% to 25% of single-core processing was replaced by a dual-core processor. Dual-core is not just a kernel, the power of control, it also includes the security considerations and application of virtual technology.
5. dual-core or walk the edge of the processor
In addition to the dual-core, now there are four hot topics. Intel has to 07 years of arrival, prepare their quad-core server. And AMD is also actively preparing for war. Vision and then farther, Intel's eight-core processor "Yorkfield" also plans to meet in 2008. It seems that more and more nuclear will welcome everyone. At that time dual-core or what you want?
【 Weak current college 】 computer registry not open solutions (2)
Registry control user mode examples are:
¡Ï Control Panel functions;
★ Desktop appearance and icons;
¡Ï network parameters;
★ Browser functionality and features.
Some of these features is and user independent, some are for the user.
Computer related control item based on the name of the computer, and login user-independent. Control type example is to install an application, regardless of which user, program availability and access is unchanged, however, running the program icon depend on the network login user. Network protocol availability and priority based on the computer, but the current connection and user information.
Here are the registry entries for the base and the computer control of some examples:
★ Access control;
★ Login confirmation;
★ File and printer sharing;
¡Ï network card settings and protocols;
★ System performance and virtual memory settings.
No registry, Win9x and WindowsNT is not likely to exist. They are so complex that the .ini files used in the past to control their scalability needs almost unlimited installation and using the application, the registry enables it. However, the registry is more complex than the .ini file, to understand how it works, what to do and how to use it to do is the key to effective management system.
In the system registry control all 32-bit applications and their features and multiple applications of interaction, such as copying and pasting, it also controls all of the hardware and drivers. Although the majority can be through the control panel to install and set up, understand the registry still do for WindowsNT and Win9x system management basics.
To sum up, the registry holds a variety of parameters, direct control at Windows startup, hardware driver loading, as well as some Windows applications running, resulting in the entire system plays a central role. It includes:
(1) hardware and software forconfiguration and status information, the registry holds the application and the Explorer shell of initial conditions, preferences, and unloading of data.
(2) networking computer settings for the entire system and all kinds of license, the file name extension associated with the application, the hardware part of the description, status and properties.
(3) performance records, and other underlying system status information, and other data.
If the registry is damaged, the light from the Windows startup process to an exception, to and potentially cause the entire system of completely paralyzed. Therefore correctly understand, use, particularly timely backup and restore the registry in question, for Windows users, it is very important. Learned knowledge of the registry, and its associated application, it will cause your computer to multitask! thus becoming a real computer whiz!
Terminology associated with the registry:
①, registry: a database in a tree hierarchy. Physically, it is the System.dat and User.dat files; logically, it is the user in the registry editor, see the configuration data.
②, & quot; HKEY: root keys & quot; or & quot; & quot; primary key, its icon and Explorer Folders icon a bit alike. Windows98 will registry is divided into six parts, and call it HKEY_name, it means one of the key handle. (Figure 2)
③, key (key): it contains additional folder and one or more values.
④, subkey (subkeys): in a key (the parent key) following a key (a key).
⑤, branch (branch): represents a specific subkey and everything. A branch from the top of each registry, but usually used to describe a key and all of its contents. ⑥, valueentry (value): with a name and a value of the ordered value. Each key can contain any number of values. Each entry consists of three parts: a name, data type, data. (Fig. 3)
¡Ï name: does not include backslash characters, numbers, the representative character, a space ofany combination. The same key cannot have the same name.
¡Ï data types: string, binary, three double-word.
String (REG_SZ): as the name implies, a string of ASCII characters. Like & quot; & quot; HelloWorld, is a string of words or phrases. In the registry string value is generally used to indicate the file description, hardware ID, etc. Generally it consists of letters and numbers. The registry is always displayed string within quotation marks. Binary (REG_BINARY): F03D990000BC, there is no limit on the length of the binary value in the registry editor, binary data to hex mode displayed.
Double word (REG_DWORD): literally understand should be a DoubleWord, double-byte values. From 1-8 hexadecimal data, we used the hexadecimal or decimal form to edit. If D1234567.
¡Ï data: value of specific values, it can take up to the 64KB.
⑦, Default (default): each key include at least one value, called a default value (Default), it is always a string.
Registry of internal organizational structure and relationships
Computer configuration and the default user setting of noteCopies the table data is saved in the WindowsNT in the following five files: DEFAULT, SAM, SECURITY, SOFTWARE, SYSTEM, NTUSER.DAT. But Windows9x/Me/2000 will all registry files into 2 files System.dat and User.dat in:. They are binary files cannot be viewed with a text editor. They exist in the Windows directory with hidden, system, read-only property. System.dat contain computer-specific configuration data, User.dat contains user specific data. User.dat file location to a user name to log in, it is located in the user name of the directory, C:\\Windows\\profiles\\ system while C:\\Windows Directory keeps a default User.dat file for new users. Internal organization structure is similar to a directory management tree hierarchy structure.
WINDOWS registry has six root key, which is equivalent to a hard disk is divided into six sections.
At " & quot; Run dialog, enter RegEdit, and then click & quot; OK & quot; buttons, you can run the registry editor.
Left pane displays the registry root keys, this root keys altogether six. These root keys are all uppercase, with HKEY_ to prefix, this command conventions is the Registry functions of the Win32API keyword symbol variable.
Although in the registry, the six root keys looks in a parallel position, had nothing to do with each other. But in fact, HKEY_CLASSES_ROOT, and the information stored in the HKEY_CURRENT_CONFIG is stored in the HKEY_LOCAL_MACHINE portion of the information, and information stored in the HKEY_CURRENT_USER is deposited information of HKEY_USERS. HKEY_CLASSES_ROOT HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE includes all of the information. Every time the system starts, the system will map out the information in the HKEY_CURRENT_USER allows users to view and edit the information.
In fact, HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes is HKEY_CLASSES_ROOT, in order to view and edit the user easy and the system is designed as a root key. Similarly, HKEY_CURRENT_CONFIG\\SY-STEM\\CurrentControl is HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControl.
Save the HKEY_USERS default user and the current logged-on user's user information. HKEY_CURRENT_USER saves the current logged-on user's user information.
HKEY_DYN_DATA saved system run time, dynamic data, it reflects the current state of the system, each time the runtime are not the same, even on the same machine.
According to the above analysis, the information in the registry HKEY_LOCAL_MACHINE and HKEY_USERS can be divided into two broad categories, the two main types of details please see the following introduction.
College】 【weak batch files to achieve complete hiding.
<br> <BR> completely confidential documents hidden skills: <BR> Open the Registry Editor, expand one of the Ben of the "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL", .In the "ShowAll" button to the right box to modify the "CheckedValue" key to "0", can change after the "Tools → Folder Options → View → Show hidden files and folders" option fails, do not want to completely hide .others see the "hidden" file; to enable "Show hidden files and folders" option to re-entry into force of the above "CheckedValue" key to change back to "1". .<BR> <BR> Here to note that the virus would have been a valid DWORD value CheckedValue removed, a new string value of an invalid CheckedValue, and the key value to 0! .This to 1 will be no effect. .(Some variants of the virus directly to the CheckedValue to delete, just the same, and following, their re-build a on it) <BR> <BR> method: remove this CheckedValue key, right-click New - Dword .value - name CheckedValue, and then modify its key value is 1, so that you can choose "show all hidden files" and "show system files." .<BR> <BR> Batch implementation code: <BR> <BR> --------------------------------- .------------------------------------------------- < .BR> <BR> regadd "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL" / vCheckedValue/tREG_DWORD/d0/f <BR> pause <BR> <BR> ----- .-------------------------------------------------- .--------------------------- <BR> <BR> excuse: regadd "registry path" / v keys / t key .Type / d specific key / f last / f is the meaning of <BR> <BR> enforcement as 0,1 for the REG_DWORD values, so / t followed by a REG_DWORD <BR> <BR> Save the above code .is completely hidden files. .<BR> <BR> It! .<BR> <BR> Hidden files so you would not be seen by others, the recovery method is very simple. .<BR> <BR> -------------------------------------------- .----------------------------- <BR> <BR> regadd "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced .\ Folder \ Hidden \ SHOWALL "/ vCheckedValue/tREG_DWORD/d1/f <BR> pause <BR> <BR> ------------------------- .------------------------------------------------ <BR .> <BR> That's it. .<BR> <BR> Specific times to write about again. .<BR> <BR> To be consolidated under the above code. .As follows. .. .. .. .<BR> <BR> -------------------------------------------- .-------------------------------------- <BR> <BR> @ echooff <BR> @ .modeconcols = 60lines = 20 <BR> colorb <BR> echo ------------------------------------- .------------------- <BR> echo. & echo. <BR> echoby China Technology Alliance <BR> echo. & echo. <BR> echo. < .BR> SET / Pa = Please enter the Y (completely hidden files) or N (show hidden files): <BR> echo. <BR> if / I "% a %"==" Y" gotoyin <BR> if / I ."% a %"==" N" gotoxian <BR> <BR>: yin <BR> <BR> regadd "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL" <BR> .<BR> / vCheckedValue/tREG_DWORD/d0/f <BR> goto: exit <BR> <BR>: xian <BR> <BR> regadd "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden .\ SHOWALL "<BR> <BR> / vCheckedValue/tREG_DWORD/d1/f <BR> goto: exit <BR> <BR>: exit <BR> echo. & echo. <BR> echo the success achieved your goal .<BR> echo. & echo. <BR> pause <BR> <BR> ------------------------------- .-------------------------------------------------- .- <BR> <BR> xxx.bat Copy the code to save test results to know under the <BR> <BR> <BR> <BR>.
【 Weak current College 】 printer of some fault---Power By 【 China power house network 】
In the Office, inkjet printers are using more general will of a device. Inkjet printer because of the use, maintenance, improper operation, these reasons some fault occurs frequently, and how to address the concerns of the users. In this we will daily work are the common fault of summed up, and I hope to everyone to help.
A common fault: printing ink scarce, illegible handwriting, the fault is the cause of most unused because the printer is long-term or for other reasons, causing the ink delivery system disorder or nozzle clogging.
Troubleshooting: If the anti-plug himself very badly, then the direct execution of cleaning the printer on. If multiple no effect after cleaning, you can get the cartridges (for non-integrated cartridge nozzles, there is a need to pursue nozzle printer, but requires careful), put the nozzle on a warm dip in a note, be sure not to put the Board part is immersed in water, otherwise the tad sucked away by blotting paper stained with drops of water, with some time after cleaning nozzle.
Common fault 2: replace the new cartridge, the printer is in power Panel "ink" lights of processing
Normally, when the ink has run out of time "ink" lamp will be lit. Replacement ink cartridges, printer Panel "ink" light, this failure is possible, a cartridge is not installed, another possibility is in shutdown state to take on the old cartridge, and replace the new cartridge. Because once again replacement ink cartridges, printer ink delivery system will be filled with ink, and this process in shutdown state does not work, make the printer cannot detect the reinstall the ink cartridges. In addition, some printer ink capacity measurement is to use the printer's internal electronic counter to count (especially on color ink usage statistics), when the counter reaches a certain value, the judge exhausting ink printer. And in the ink cartridge replacement procedure, the printer will on their internal electronic counters are reset to confirm that you have installed a new ink cartridge.
Solution: turn on the power, will head to the ink cartridge replacement position. The cartridge installed, let printer ink-filled, filling ink process is finished, troubleshooting.
Three common fault: nozzle soft plug of processing
Soft plug plug is for various reasons the ink in the nozzles on the viscosity gets bigger by the broken line failure. General use original ink cartridges after repeated cleaning can be restored, but this method is a waste of ink. The simplest way is to use your hands to the empty ink cartridge cleaning nozzle. Use an empty ink cartridge cleaning before using needles in residual ink cartridge as far as possible, the better, cleaner and then join the cleaning liquid (accessories market sale). When annotating the cleaning fluid, clean environment, combined with good washing of ink by printer normal operating computer, continuously press the printer cleaning key to cleaning. Using the ink cartridge cleaning residual ink and in mixed light color print test, after change fine normally cartridge can be used.
Four common fault: printer cleaning pump nozzle of fault handling
Printer cleaning pump nozzle acted more, also contribute to plug one of the major factors. Printer cleaning pump nozzle on printer nozzle protection plays a decisive role. Nozzle car back in place, the cleaning pump nozzle on a weak suction nozzles, conducted on the sprinkler protection seal. Install a new cartridge in the printer or nozzle has a broken line, machine at the lower end of the suction pump to carry through its exhaust nozzles, the nozzles work accuracy higher the better. But in actual use, its performance and tightness due to time, dust and ink in the mouth of residue solidification of increase and decrease. If the consumer does not constantly check or cleaning, it will make your printer nozzle constantly out failures.
Conservation of this part of the way: the printer's top cover removed removed trolley, needle aspiration and pure water for irrigation, especially on the mouth of microporous gasket in mosaic full cleaning. In this to remind the user to clean the parts mustn't with ethanol or methanol cleaning it, causing this component of microporous gasket solvent mosaic. In addition to the ink jet printer to as far away as possible from high temperature and dusty environment, only a good working environment in order to ensure the normal use of the machine for long.
Five common fault: detect verticle lines normal and print accuracy significantly worse treatment
Inkjet printer in use will vary depending on the use of the frequency and timing of extension and print accuracy becomes poor. Inkjet printer nozzle is life. Usually a new nozzle from starts using the end-of-life, if no failures more smoothly, which is 20-40 ink usage life. If your printer is used for a long time, now of print accuracy, you can replace the ink cartridge of methods to try, if you change the cartridge, the results of its output print are the same, then your printer nozzle to be replaced. If there is a change in the future replace the ink cartridge, you may use the cartridge in a poor quality of non-original ink.
If the printer is new, the printed results cannot satisfy you, frequent print segment is not clear, text graphics, skew, text graphics outer boundaries blur, print out the ink control synchronization accuracy is poor, this means you may get a false cartridge or cartridges are used by the original product, it should be replaced immediately.
Six common fault: walking trolley handle dislocated to meet
Inkjet printer walking trolley track consists of two powder alloy copper sleeves and a combination of precision steel shaft to slip through. While walking on the car design and installation of a film of oily felt washer to complement the axis on lubricating oil, but because we live in an environment where there is dust everywhere, with the passage of time, will air oxidation, dust and damage the shaft surface aging and expiration of lubricating oil, then if you continue to use the printer, because the axis and copper sleeve friction increases the dislocation resulting trolley until collision front result cannot be used.
BR > the solution is: If this fault should immediately turn off the printer power supply, by hand will not return the car to push back to the parking. Find a small piece of sponge or felt, in sewing machine oil immersed in oil, use pliers wipe around on the spindle. It's best to spindle down to wash the oil, the best results.
Meet another car is damaged because of a device. Printer cart parking above a photoelectric sensor, it is the printer system board provides print car reset signal of important components. This component if the dust is too large or corrupted printer car will not find return signal hits the front, which is not available when the failure of general out this device needs to be replaced.
Weak current College】 【router log problems eliminate skills summary.
<br> <br> Router log defects swept tips meeting, router log problems handling queries is very worthy of discussion, in the "view syslog with" good time period in the configuration, and then configure the internal firewall start time period certain functions are .basically OK. <br> <br> Log on to network security is key, he documented the system every episode of all sorts of things, you can resolve that he came to check error causes of seizures, perhaps when the attacker attacks left the scene .. A router is a variety of information transport hub, is widely used in enterprises and institutions of the network set up, to assume the LAN local area network and wide area network between and asked the burden of convergence. <br> <br> Cisco .is now using the analogy of a router in General and, in many industry system has widespread use. The following is the net-trapped in the daily task of some on Cisco router log defects of understanding, these instances are used in practice and inputs in .debug that, for the masses. <br> <br> Some of the main information router can seek the syslog facility on the internal network of Unix host for the router log doesn't work. In the router running processes, the router will send .to the log host contains link building failure information, packet filtering information, and so on log information, log on to the log host and network maintenance staff to understand log, the log file analysis can assist in maintenance enforcement problems positioning, wrong sweep and network .security maintenance. <br> <br> View syslog is equipped with <br> <br> The first brief syslog with, which is the standard Unix, trace record mechanism, syslog can record something or locally resolve network recorded another host, and then .write that information into a file, or with, or send a message to the user. <br> <br> The primary basis for syslog mechanism in two major documents: / etc / syslogd (daemon) and the / etc / syslog.conf .configuration file, the control is determined by the syslogd / etc / syslog.conf to do. Syslog.conf file specified in the order records router log syslogd wrong behavior, the sequence at startup query syslog.conf configuration file. <br> <br .> This file consists of different order, or a single entry into categories, each on a separate line. For each type of audio provides a selection of domains and a measure field. These fields are separated by tab (Note: to use the tab key .to separate, you cannot use the SPACEBAR), select the domain type of the specified audio and priority; initiatives accepted domain to a specified sysloqd and pick the specification phase marriages performed when the message arrived. <br> <br> Each option is equipped .and priority. That is the first column and write "where" and "what level". Then use the tab key to skip to the next bar continue to write "coupling conditions now what to do". When specifying a priority, syslogd will record .two have the same or higher priority news. Each row of the domain specified when selecting fields were selected after a given audio should be sent to him. The first column contains the circumstances and level, separated by a decimal point. Detailed settings as follows: .<br> <br> 1. in what cases recorded <br>, óÜ Various different situation to the following universal conspiracy to resolution: <br>, óÜ Auth on system security and application to certification; <br>, óÜ Cron on system .automatically sort performs (CronTable); <br>, óÜ Daemon on background execution order; <br>, óÜ Ken about System Center; <br>, óÜ Ipr on the printer; <br>, óÜ Mai1 on e-mail; < .br> ¬ ° √ î news about message forum; <br>, óÜ Syslog records on the system itself; <br>, óÜ The user on the application; <br>, óÜ Uucp copying each other on UNIX (UUCP). < .br> <br> 2. what level records P <br> <br> For example you want to record the info level things, notice, err, warning, Crit, alert, emerg, etc in the info level above will also be recorded .. The above written by 1, 2, combined with a decimal point is out of the wall's "what you want to record" wording. <br> For example mail.info that e-mail delivery system of General information. Auth.emerg is .on system security is a serious message. Ipr.none said do not record information about printer (often used in multiple record condition combinations used). In addition there are three special symbols are available: <br> <br>, óÜ The asterisk ( .*): represents a detail in all projects. For example mail. * represents just the mail, no matter what level are recorded. And *. info will give all levels of the infn to record down. <br> <br>, óÜ .The equal sign (=): indicates that only records the level now, its not recorded on the grade. For instance, the example above, always write the info level, will be located in the info level above notice.err.warning, crit ., alert, emerg, other levels are also recorded. But if you write = info you would only need to record the rank info. <br> <br>, óÜ An exclamation point (!): indicates that no records are now the level .and the level. <br> <br> 3. record storage location <br> <br> Sysloqd provides the following methods for you to record system attack of things: an ordinary file, this is the most common way. You can specify the .file path and the file title, but required to catalog the symbol "/" the beginning, the system will know that this is a file. For example / var / adm / maillog said toRecords to a known as below / var / adm maillog file .. Assuming without this file, the system will automatically occur. <br> <br> Specifies the terminal or other equipment: <br> <br> You can reach the system records written to a terminal or equipped. The system records written to the .Terminal, it is now being applied to the Terminal users will see on the screen directly in the system information (for example / dev / conso old or/dev/tty1, you can take a screen designed specifically to display system information). The system .records written to the printer (for example p0/dev /!)., Then you will have a long record of printed full system so that the paper network intruders cannot amend the router log defects to potential intrusion traces. <br> <br> .The specified remote host: <br> <br> If you do not use the system information recorded on the local machine, you can write down the network with the title of another host, and then the title of the host first surface combined with the ."@" symbol (for example (@), but are you ccunix1.variox.int specified host must be sysloqd). This prevents the situation because of a hard disk error, so that the router log defects files lost. <br> < .br> Above is the syslog level the records and records of wording, can according to their own needs, under their own need to be recorded. But these records are constantly added, unless you remove the file itself, otherwise the files will become larger and .larger. Syslog is equipped with a network of the attacker's significant purpose, resolved to amend the log to potential intrusion traces, and therefore it should be borne in mind. <br> <br> It is best to make each week (or less) .regular inspection of a recorded file of the habits and outdated records file in accordance with the serial number or date of the backup, you can also compare now lookup. Do not record *. *, so no matter what is written down, the result will .incur file is too large to find information on basic cannot immediately find out. Someone has entered a blog, and who to ping host to his records, it does not only reduce the system efficiency and added a hard disk usage. <br> <br .> Router log fault functions detailed configuration methods: <br> <br> The first in the UNIX host to do the following tasks to super user registration entry: 168.1.1.2 to log the IP address of a host. This router implementation of some actions .will be documented in mail_debug and r2509_debug both files. <br> <br> <br>.
【 Weak current College 】 of five data storage security tools
In the last moment, we have explored for typically store maintenance personnel, the necessary five data storage security testing tools, the close link between these tools, either for network maintenance or still store maintenance, are thought to be. However, these data storage tools are only to be used in larger enterprises, so that when we're turning to SMEs should be tools corresponding to? this article will examine five data storage security tools that small and medium-sized enterprises, all the more simple and appropriate.
Common data security questions
Looking for storage-associated vulnerabilities, there are three areas need attention:
1. in a network environment in the use of storage host;
2. in your storage system services, use, and sharing;
3. some can lead directly to vulnerabilities specific weaknesses;
As of this point of uncontrollable factors, as well as the possibilities are many, but if you can pay attention to and what factors make a decision, you can make some of these have become essential. In my experience to talk about, I have had four storage-related vulnerabilities:
1. the unknown or forgotten those not patched in daily or system maintenance within the scope of the system;
2. in the operating system layer and use the dimensions of those without patching of software;
3. in the Web page maintenance interfaces use weak passwords for security and access control permissions;
4. those without protection is shared on the network can be free access to sensitive files and databases;
LANguard and QualysGuard
In order to be able to help prevent and deal with some of the more common questions about the data stored in the security questions, you can choose to use relative price low vulnerability scanning tool-LANgaurd.
LANguard is looking for available hosts, open ports, and many see vulnerability comparison tool for the novice. Also has an embedded on LANguard inside to find shared files on the network permissions security gadgets.
Another useful tool is the QualysGuard, is an almost able to cover all vulnerability search scan tools. It is able to scan those that exist in the operating system itself, or the use of the things you never be thought of vulnerability.
These tools offer you buy lisences is different from the price, but also means that there is not the same as the system can be scanned. You will need to spend hundreds of times or on us, as long as you own the necessary. To be able to rest assured that this investment will be of special merit. However, before you decide to purchase any data storage security tools before, make sure you have tested those tools and useful for the company.
Acunetix Web vulnerability scanning tools, and Web security scanner N-Stalker
For a Web page, the Acunetix Web vulnerability scanning tool is an especially good vulnerability scanning tool.
Acunetix Web vulnerability scanning tools to your current storage environment to find many common Web-based vulnerabilities, contains for example the default/empty password, the login mechanism flaws, even such as cross-site scripts and footnotes that some SQL input validation flaws can be scanned.
Addition of a Web page called N-Stalker use security scanning tools products can also be used to scan for vulnerabilities on a Web page. You just need a basic click Scan tool and make it point to you want to test the Web page address of the system or the system's IP address, keep the default options and then run it to. The scan is finished, the result will be a production, it carefully describes what is required to be attentively and enhanced.
In the end, or you use QualysGuard LANguard handled share and file permissions vulnerability on, you will start to worry about what you have to do with those not on the network that is free to access sensitive information. This is also the current you face the greatest risk of commercial information. IdentityFinder as a scan of a useful tool for sensitive files.
IdentityFinder as in a network shared drive search tools have a separate Edition and Enterprise Edition for the user to choose from. If the angle from the low-cost worry, a called FileLocatorNetwork products have the same function.
In short, your small business environment will benefit from these data storage safety tool, especially when you need to search those major environmental vulnerability is particularly useful when stored.
About the author: KevinBeaver is Atlanta PrincipleLogicLLC independent information security consultant, speaker, and professional witnesses. In the industry independent information security risk assessment and information service, he has over 20 years of valuable experience. Kevin was made and in which seven book on information security books that cover the hackers of which for example "HackingForDummies" and "HackingWirelessNetworksForDummies. He also is the information security audio books as well as one for it professionals with security knowledge learning of the founder of the blog.
Saturday, May 7, 2011
【 Weak current College 】 WinRAR uses the underlying skills detailed
WinRAR is a pop-to-use powerful compression decompression tool. Support for the mouse to drag and drop and shell extensions; perfect support ZIP2.0 archives; built-in program to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, Z and 7Z and many other types of archives files, image files and combinational file TAR; have a history, and Favorites; new compression and encryption algorithms, compression ratio further improved, and resources in occupies a relatively small and can be tailored for different needs to save different compression configuration; fixed compression and multi-volume release squeezing and text class, duomeitilei and PE class file optimization algorithm is the most compression tool that does not exist.
1, repair damaged zip files
If you open a zip file, only to find that it has damaged. It can start WinRAR, navigate to the damaged compressed folder in which to select the file, and then select the toolbar "repair" button (the English version of the Repair), determine repair WinRAR will start after this file and repair window will pop up. Simply select Repair Zip file package or RAR compressed package.
2. compression off automatically
Start the "Explorer", select the file. Right-click, choose "add to WinRAR → compressed package" command, open the "compress the package name and the parameter" window, "Advanced" tab, and then select "finished off the computer power supply" check box. Thus, backup data, the machine will automatically turn off.
3, encryption, compression, important files
Use WinRAR, you can encrypt, compress, important files: in WinRAR, select "file" menu, "set default password" command, and then set a password (the right to lengthen the password), then turn to the encrypted file compression. This allows you to encrypt, compress, encrypt important files in the compresses files while you can, indeed killed two birds with one stone.
Division 4, file
Use WinRAR can easily split files, but also in the segmentation can also compress the file. Operation with fairly simple, just choose an option: start WinRAR compression software, and select OK to compress the files (you can select more, you can also select folder), and then click the "add" on the toolbar icon, and in the pop-up window, click the "compressed volume size, the bytes" drop-down list box, select or enter a split size. Click "OK" button, WinRAR will follow segmentation size generated split zip package.
5. put the WinRAR as file manager
WinRAR is a compression and decompression tool, but it is also a very good file manager. As long as in the address bar, type a folder, all files under them will be displayed, even the hidden files and file extensions can also be seen! "you can completely resource manager" in the same copy, delete, move, or run the file.
6. generate ZIP compressed files
In WinRAR has built-in ZIP compression, just select the file, click the toolbar's "add" button, and select the zip file format can be generated for ZIP ZIP file formats, eliminates the trouble of starting WinZIP.
8, batch install WinRAR
One installation of WinRAR is very easy, just follow the Guide step by step, click on "next" button, but if you need to install WinRAR to many computers (such as an engine of all workstations), repeatedly asking install problem may make people feel that annoying, in this case you can run WinRAR installed plus parameters:-s, so you can skip all the problems and uses the default value instead.
9, the relative path of the compressed file
In WinRAR you can in the "zip file name and arguments" window, click "file" tab, and then select Compress relative path or absolute path, not even choose the path, so that the user has a choice.
10, customize the toolbar WinRAR
In WinRAR for many of the toolbar buttons, in fact, you are free to customize it: launch WinRAR, press Ctrl + S keys, and open the "settings" dialog box, select the "General" tab, click on the "buttons" button on the toolbar button and select a file, right-click the shortcut menu of commands for adding and removing. After some settings, now of WinRAR is more thoughtful your habits.
11, easy import export personalization
Use WinRAR, inevitably on WinRAR according to personal preference settings as necessary, and if the other machine, then run WinRAR will discover style and your own, then also have to set it, the more trouble. Select "options" → "import and export settings" under the appropriate commands to easily add your own settings to a REG file to the registry, or you can import and use up more personalized.
12, set the WinRAR associated files
Start WinRAR, then select "options" → "settings", open the "settings" dialog box, click the "comprehensive" label. Then select the associated file. Of course, in the face of such excellent compression software, click on "select" button is not bad!
13, set the WinRAR startup folder
If you have a folder of the compressed file, start WinRAR you have to select the folder that is not veryTrouble? you can use this folder to the startup folder, when you start WinRAR will open this folder, this will facilitate a lot: start WinRAR, press Ctrl + S keys, click the "settings" dialog box of the "path" tab, remove "in the startup recovery to the last work folder" check box. Then click the "start in" folder "Browse" button from the pop-up window, select the appropriate folder.
14, a shortcut to generating WinRAR
To quickly open a program, usually to the program on the desktop or start menu to create a shortcut. In WinRAR, establishing a shortcut to very simple, you just have to press CTRL + S to open the "settings" in the Properties dialog box, and then select the "General options" tab, in the "interface settings" item you can select on the desktop, start menu, etc. create a shortcut to WinRAR, such use will facilitate a lot.
15, fast batch conversion package
If you want to put the other formats are converted to a compressed package RAR package, there is an easier way. First the zip file into a folder, such as H:fan. Then open WinRAR, click "order" menu "Convert compressed file formats" (shortcut key ALT + Q), in the open "Convert compressed file" dialog window, click on "add" button, select the file you want to convert, and then check the "delete original compressed file" check box, click the "OK" button to convert RAR compressed package. Use this method you can use ZIP, CAB, ARJ, ACE, TAR, UUE, BZ2, GZ, LZH, RAR compressed package into.
16, using WINRAR hide document browsing records
When you open a document, you will have a corresponding history. For example, open a Word document in the [documentation] (XP is called [my recent document]) build a shortcut, and the Word [recent file list] traces left. In this way, each time to clear documentation is very troublesome. Use the following simple way, with WinRAR you can hide various documents through the records. Create a rar compressed package, the files inside. Open the file again, you will find the trace free!, of course, if necessary, to file in rar plus the password.
17, ingenious protection against external self-extracting program security risk
Many people use WinRAR to bundled Trojan, hereby suggest to you, receive an executable attachment files, save them first. And then try to right-click on it, if you have "use WinRAR to open" command, then this program is a self-extracting program. You can put the file extension from "exe" to "rar", and then open with WinRAR, which will secure a lot.
18. How can I set a permanent password WinRAR compression for General
If you make an encrypted compressed package very frequently and are using the same common password, you can let the WinRAR to automatically add a password, you make a zip file, the default password is automatically added in, very convenient. By: open WinRAR, select "options → set" command in the pop-up "settings" window, select "compress options" tab, and then click the "create a default configuration" button in the pop-up "to set the default compression options" window, select the "Advanced" tab, click the "set password" button, the last set in the "password" enter your own common password, press the "OK" to save the settings.
19, edit the files in the compresses Pack considerations
In the edit the files in the compressed package, don't close the Cabinet window, otherwise you cannot save modifications to documents. Also, if you double-click to open other RAR compressed packages, WinRAR will automatically turn off you are modifying a file in the zip package, so we recommend WinRAR window press "Ctrl + S" key to cancel the "General" tab of "the reuse of already existing window" check box.
20, hide the file name of the compression bag
Almost all the compression software provides encryption capability for the protection of personal privacy and important data. But they are largely neglected the encryption on the file name. Once someone else on your data interest, data security is becoming precarious. Therefore, it is best to put the file name is also included in the scope of encryption. If you do not know what compression bag keeps, who will be consuming? WinRAR crack can be the file name encrypted RAR file, as follows: first in WinRAR's main interface click on "add" button to create a new package, and then in the pop-up window, select "file" tab, and select the text you want to add to the compressed package file, and then switch to "Advanced" tab, click "set password ..." button, enter the password. It should be noted that, in the click on "OK" before, be sure to select "encrypt file names" options file name encryption can be achieved.
21, locked cabinet file security
When in RAR compression when you delete a file in the package, WinRAR automatically updates it, those deleted files never recovered. Therefore, do not need to modify or relatively important cabinet, in WinRAR, click to select the compressed package, press the key combination Alt + I to open the information in the compresses the conversation window, click on switch to the "options" in the options page, in the compresses the "lock" file-like "prevent modification in the compresses files" check box is selected, click "OK" button. So this cabinet is locked, the file cannot be modified or deleted. Note: the above operations only for RAR compressed files, and enable locking compression file feature is generated after the Cabinet will no longer be able to repairInstead, this is very useful to backup important data.
22, advance knowledge of file compression size
Want to know how to compress the files in the compresses after much? please open WinRAR window, select the compressed folder or file, and then click the toolbar's "information" button in the open window, click the "estimated compression ratio" feature "is estimated in the bar" button, WinRAR will give the compression ratio, compact package size, and the estimated time, data compression, which you compress a large file or folder is useful. If you want every time you click the "information" button, WinRAR automatically evaluates to the file, you can select the "auto start" option.
23. why cannot delete temporary file WinRAR
Why WinRAR just extracted is located in the Windows temporary folder for temporary files cannot be deleted even if WinRAR automatically? WinRAR software has turned off. This is because the files in the temporary folder is where you use the drag method from the compressed file to extract the files in the package or by using an external viewer to open compressed files. In some cases after the closure of the WinRAR files may still be other software use, there is no reliable way to detect external programs still need these extracted files. So WinRAR does not immediately delete them. And when you next run WinRAR, all more than an hour of temporary folders or files are deleted. If you extract the files when you do not want to use a temporary folder, or you can use WinRAR graphical mode to "extract" command or use the associated menu "extract to" project, rather than dragging.
24, add comments to the Cabinet
Use of compressed files, and over time will not know which files, not to mention what files, if you were to write a few words of a compressed file, then open the comments to see just what it is, in effect Hui WinRAR provides this functionality. Specific method is to use WinRAR to open the corresponding RAR file, and then click the toolbar's "comment" button, in the note window, enter your comment content (support Chinese input). The next time you want to add or view again click on the toolbar's "comment" button. Then open the file, its annotation information appears in the window on the right, at a glance!
25, interface themes easily swap out your WinRAR
Compared with the previous edition, an important update WinRAR3.51 is to support the interface theme replacement, although this feature and have the associated work of WinRAR, but for the pursuit of personality, like DIY friend, this feature is still worth a try.
1. open WinRAR, select the menu "options/themes/for more topics," or open a Web page, enter the WinRAR theme www.rarlab.com/themes.htm download page.
2, because the replacement interface theme for WinRAR's new features, now WinRAR official website provides several sets of toolbar icons interface theme, icon dimensions are 32 × 32, 48 × 48, 64 × 64. Click on the appropriate content download.
3. double-click on the downloaded RAR compressed package file, you compress the package automatically opens and installs the new theme dialog box pops up, click on the "install theme is" button. Interface topic after installation is complete, a pop-up dialog box to prompt a new theme to use.
http://hi.baidu.com/meilifang
4. open the menu "options/themes/management topics", you can see just installed interface topics appear in the dialog box, select the new theme, click the right-hand button of the "select", the new theme is applied. Note that the dialog box below still has a "applied to the compressed file icon" option, you can set the icon for the associated file WinRAR.
【 Weak current College 】 how to check your computer for someone else "broiler"
We definitely need regular check their computers are not intrusion, intrusion if found, will have to try every possible way to clear out a Trojan, when necessary, the preferred format reload nor give an attacker the opportunity to leave behind any.
Next, we introduce the "broiler" computer some phenomenon, remind users encounter these phenomena, it is necessary to pay attention to check. The final article will introduce several tools to help analyze the native security.
In 1: QQ, MSN login reminder of exception
When you log on QQ, prompted the previous login IP and you are completely irrelevant. For example, you obviously only in Shanghai's home on the QQ but remind your last login in Shenyang.
Also, when you log on MSN, you may have a friend you will receive your message, ask what you have just made a very clear, but you never give this what messages from your friends.
In 2: network game logs found equipment lost or your last location of the next line, even using the correct password to login
Obviously, you are not logged in this game, others have for your login.
In 3: sometimes suddenly found your mouse twitched, you do not move the mouse, the mouse will move, and click on the relevant button operation
You're not moving, it is that someone is moving. Note that this mouse movement trajectory and poor the optical mouse automatically shift markedly different. You can feel that this is someone in your computer.
4: normal Internet phenomena, suddenly feeling very slowly, and the hard drive light is flashing, just like you do in the COPY file
This situation is most likely attacker is attempting to COPY your files, in a large number of COPY paper, disk read and write clearly increases, the system will slow down. At this point, you should not hesitate to unplug the network cable, to immediately check your system processes is abnormal.
In 5: when you are ready to use the camera, the system prompts, the device is in use
Finished, an attacker has stolen your camera, in this case, the camera's operation is not visible.
We strongly recommend that you don't have the camera, the lens to the lid, the attacker can see dark images, you will understand what is the problem.
In 6: you are not using a network resource, you discover network card light flashing. If you set to display status when connected, you will also find the bottom right corner of the screen in a Flash card icon
Normally, when you use or instead of network resources, network cards blinking will not be obvious that the data passed over the network traffic will not be too high.
The above phenomenon, basic is subjective and not very accurate, but you need to call your attention.
Next, we can make use of some software for observation of network activities in order to check whether the invasion.
1. pay attention to check the status of the firewall software
For example, Jinshan Wangbiao. In the network status page will display the currently active network connection, carefully review the related connections. If you find yourself not to use the software to connect to a remote computer, you should be careful.
2. it is recommended to use tcpview, you can very clearly see the current status of the network's activities
General Trojans connection, is available through this tool to view the results.
In this connection, the General Trojans is distinct from some carefully constructed more clever Trojan's rootkit hidden technology not easily found.
3. use kingsoft cleanup specialists online diagnosis, pay particular attention to the full diagnostic process item
Cleaning specialist for each item for security assessment, when encountered an unknown item, require special care.
4. cleaning expert knowledge of the process manager
You can find a suspicious file, and give you a simple check for dangerous programs reside
【 Weak current College 】 identify virus file four very good method
We use antivirus software antivirus, often detects a lot of "viruses", many friends holding you "prefer a heap, never let a" attitude will detect all of the "virus". In fact, all-delete is not desirable to have infected the system file is not deleted. Here are several ways to identify virus files, and they hope to everyone to help.
First, the file time
If you feel that the computer is wrong, check with the antivirus software, nothing reflected or clear part of the virus still felt wrong, you can check the suspicious object file time.
File time into creating time, modification time (there is also an access time, do not cares), you can see the file's properties, click the file, right-click, select the menu property to "General" page to see the time.
Usually a virus, a Trojan file created and modified are relatively new, if you found early, basic is the day of the last few days. C:/windows and c:/windows/system32, and sometimes c:/windows/system32/drivers, and if it is 2000 system, the above windows into winnt, these places are viruses Trojans often stay in place, according to the time-of-sequence (see the-details, and then click on the title bar of the "modified"), see the following updated file for several days, with particular attention to the exe and dll files, and sometimes dat, ini, cfg files, but behind the normal file also has a relatively new modification time, cannot be confirmed will be put aside and focus on finding exe and dll, but after three or executable file. Generally speaking, the system files, in particular the exe and dll) does not have such a new modified.
Of course, update or install other applications may have to modify the time, you can then control the creation time, what time they don't have this what software should be aware that really do not know how to use the search feature in the hard drive and find the relevant time have not established what folder to look at is the installation of application software, as long as the time on something that is normal. If you are not satisfied, that is, remove the virus.
Note, as not all the latest files are viruses, nor that all virus time is up to date, some virus file date-time and even show a few years ago.
Of course there are other methods of resolution.
Second, the file name
The file name is the first impression, the primary by file name to determine whether the suspect is the most direct way, the reason behind the time judgment is from a bunch of files in the pickup suspect too difficult, or easy following sequence time line.
We often say random letters (and sometimes the digit, fewer) combination of file name, a favorite with its virus (has found some good software also uses this strange combination of habits, such as Yahoo Internet Assistant, each file name is different, there is a motive of suspicious, cat driver also seemingly random combinations, but fortunately there is information that can help distinguish between manufacturers, the next thing to say).
There is also the length of the file name, and some serious beyond the standard 8-bit file, there are several 10, this should be listed as suspicious objects, especially IE plug-ins have the file name appears.
Of course, that file name weird random combination, does not seem to be a standard, familiar with computer people look at all the English filenames may think is strange, meaningless combinations, so it relies on the file name of the judge, or to the system folder of files, regular file has the certain understanding to better grasp. Initially, the combination of the above time there are other means common judgement, or can find something.
Another is to fake a normal file, system file, it is better to identify, such as svchost.exe and svch0st.exe, obviously the latter impersonates the former, this incident down more easily exposed, the premise is that you are more familiar with the system file name, something that is okay to open Task Manager learning about it.
Corresponds to the file name, service name, the driver name, registry startup item name, relatively speaking, the project name if not indicated a certain meaning, but it is a virus, a few manufacturers are not responsible for their own software to use the services, drivers, and startup items a meaningless and random combination of name, services, drivers, startup item is defective, then the following documents must be used.
Really not sure, put the file name (sometimes you want to include the full file path, a different path of the file with the same name may not be the same, the later said), service name, the driver name, startup key name on the Internet to search for it and see what others say, especially not find, there are also services, drivers, startup items and file name on the to do (as a service name in Internet identifying different files and corresponding, or vice versa), can be classified as suspicious objects.
3. version information
Check the file time is uncertain, with a check for the version of project files, also in view of the properties file, file version, manufacturer information, etc. First of all clear, not all files have the version information, nor is it all without version information of files are virus files, not all display Microsoft information files are really Microsoft 's.
The file name, file date, and then on the file version, the Basic can draw a result, such a strange name, displays the Microsoft vendor information, obviously suspicious; or should have a good system files (such as explorer.exe or userinit.exe) but no version information, might be replaced by a virus or destroyed; soundman.exe manufacturers information turned out to be 1, you can consider deleting it, should not sound card program.
Version information in addition to the original manufacturersThe file name, and sometimes you'll find one here and check the file a different name, it is not there.
4. location
Virus Trojan horse likes to stay in place is the system folder, windows and windows/system32, windows/system32/drivers, and c:/programfiles/internetexplorer/c: c://programfiles/internetexplorer/plugin, programfiles/commonfiles/miscrosoftshared, there is a temporary folder, IE cache
First temporary folder c:/documentsandsettings/your username/localsettings/temp and c:/windows/temp must be clear, and you can boldly deleted, regardless of good or bad, by deleting the okay, IE cache should also be clear, not directly into the folder to delete from the IE menu Tools-internet options, delete file-delete all offline files, preferably at senior it set to close the browser to automatically empty the temporary files easy.
Other folders, see if there is not the existence of the file exist, such as the Windows folder much what rising file (Kaka is there in it), realplayer file, there are definitely suspicious, such as svchost.exe, ctfmon.exe suddenly appears in the windows or any other folder, instead they should be in the system32, can determine is a virus. Of course you can combine the above judgment in several methods. Sometimes it is depends on experience, the other file less folder better judgment, what is very easy to find, such as windows, ie, look, you know the basic who, more than one or two exe or DLL that can be found at once (many rogue software that would fit in here).
There is a general registry startup items, startup item in reference to windws, basic is an input method, sound management, the more suspicious, refers to the System32 of the more eyes, is uncertain, doing things, to the online-search the file name. If you find startup item point to font font folder, that do not have to think about it, we have a problem.
Service-driven, not in system32 or driver will check in (natural or below them, not to mention not to check in).
In addition to the folder location, and registry locations, with the exception of a few RUN startup items, there are image hijack (IFEO) to check the value of a debugger, it's important to be aware of it, except the last one there is a debugger = yourimagefilenameherewithoutapath ntsd-d, the other is not, as long as we have found is hijacked (immunity, immunity is a known virus program name hostage to a nonexistent file, so it can't run), and then find the hijack file is the file after the debugger, found together with the registry key with the deletion. But note that now the hijacking some used is not a virus file, is a system file or a command, such as svchost.exe or ntsd-d, do not delete the file, as long as the registry entry deleted.
Also note that the registry key has the appinit_dlls, generally to a null value (exception, Kaka's one file will be placed on this), if a value is the virus removed by name to find. Another is the userinit, generally also be empty, many things change will look normal.
Recommend using SREng to examine, more convenient, it will automatically prompt the above modifications.
Conclusion:
Really, really want from a bunch of English names identify suspicious file name difficult, integrated use of various methods, combined with tools software category display is the shortest way, for example, service-driven SREng listed names, files, paths, a swing, obviously, has the name is arbitrary, controlled rear filename is clear, and some careful will impersonate system service name, but the contrast with a normal, or even network, or you can find out the problem (hide Microsoft services non-Microsoft service is exposed, and if you have a system service name on top of or near the system service name, you must have a problem, not the normal service changed, is an extra plus came in top legislator highlights IPR protection).
【 Weak current College 】 WINDOWS2003 and fundamental difference of Windows XP
WindowsXP
Or Windows XP release on 25 October 2001, the original name was Whistler. Microsoft initially released in two versions, Home Edition (Home) and professional (Professional). Home Edition of consumption objects are a home user, Professional Edition, Home Edition, on the basis of a new design for the business-oriented network authentication, dual-processor. And Home Edition supports only one processor, the Professional Edition supports two. Letter of the English Word XP said "experience" (experience).
WindowsXP is based on Windows2000 code products, but with a new graphical user interface (called the goddess Luna), it includes some minor modifications, some of which appear to be from a Linux desktop environment (desktopenvironmen) such as KDE gain inspiration. Landing with a graphical user interface is an example. In addition, WindowsXP also introduces a "personality" based user interface that makes the tool bar enables you to access the details of the task.
It includes a simplified Windows2000 user security features, and integrate a firewall, to ensure that long dogged Microsoft security issues.
WindowsXP-minimum system requirements: recommended computer clock frequency for 300MHz or higher processor; at least 233MHz (single or dual processor system); recommended IntelPentium/Celeron series, AMDK6/Athlon/Duron family or compatible processor recommended 128MBRAM or higher (minimum support 64M, may affect the performance and some features), 1.5GB available hard disk space, SuperVGA (800x600) or higher resolution video adapter and monitor, CD-ROM or DVD drive, keyboard and Microsoft mouse or compatible pointing device.
WINDOWS2003
The waffling over WindowsXP, Windows2003 (full name WindowsServer2003) is the Microsoft's .NET strategy toward the DPRK and the real step forward. Windows2003 at first name is Windows.NETServer2003, 2003, 1, 9, renamed the WindowsServer2003, and may this year into the mainland market, including StandardEdition (Standard Edition), EnterpriseEdition (Enterprise Edition), DatacenterEdition (Data Center Edition), WebEdition (Network Edition) four versions, each version has a 32-bit and 64-bit two encoding.
It has a large number of inherited WindowsXP friendly operation and network characteristics, Windows2000sever is also suitable for the individual user and the server uses the operating system. Windows2003 full and continued the WindowsXP installation convenient, fast and efficient features, almost does not need much human intervention can automatically complete hardware detection, installation, configuration, etc. Although the name, Windows2003 and continued the Windows family of customary law, but named from its various built-in services and the redesign of the core program, Windows2003 and Windows2000/XP is essentially the difference. Windows2003 minimum requirements for hardware, and is similar to EnterpriseEdition version Windows2000Server on CPU frequency requirements 133MHz above, memory minimum requirements for 128MB.
Comparison:
The following are the specific differences:
1. see what user. If you are a general user, playing computer level is not very high, what problems have asked people in General to help you solve, technically, it is recommended that you use XP or ask others to help you install windows2003. Because windows2003 for security reasons are many, many things that the default is not open, in use, if you have a low level, it might be going to faint.
2, windows2003 design is dedicated to the server, however, after a small amount of parameter adjustment, can be a very good platform for personal entertainment. However, if you have any old hardware, especially the four or five years before the production of things, be sure to understand whether or not compatible. If your machine is new purchases of less than one year, hardly any compatibility problem will occur. In most cases, the hardware driven using win2k or winxp down just fine. In addition, unless you specifically indicate drive suitable for windows2003, otherwise you must not install drivers for the motherboard and the hard disk drive. Other: If windows2003 itself properly understand your hardware, and can make your hardware in normal use, it is best not to drive the other Assembly, or mirrored backup before you try.
3. in the image/movie collection, production, windows2003 seems to have inherent inability (or developers have not kept pace with), many scanners, digital cameras in windows2003 is not in working condition. I have a purple light scanner and Panasonic camera can not. Conversely, in XP to good use.
4, XP multiuser management functionality is very bad, bad enough and windows2000server in XP, not on a disk, a directory of the right to access, read and write, and a special set windows2003 do very well. Therefore, if you want to use multiple user system, want to place the others can't access something, windows2003 is a very good choice, but also for the technology a little good friends would find use in a restricted account, windows2003 99.99% of viruses, Trojans, malicious programs on your machine will not work. (XP can also use a limited account, but no windows2003 management features strong). However, there is one thing stronger than windows2003 XP, XP multiple users log on locally at the same time (start-"off-on switch user) so far, only win XP has this feature.
5, professional computer technician, or want to really learn computer technology friends, windows2003 is a very good choice. Because it is a real Server, many programming environments, many database management only in Server environments can really use. Especially the network environment, IIS, etc, because XP has 9 concurrent users at the same time limit, windows2003 obvious connection than XP to powerful.
6. for most games, windows2003 and no differently under XP. For some old software that is compatible with the following setting to windows2003 way I found at run time, you cannot use under XP, windows2003 but cannot use (such as the universe back Word, etc). The current popular games rarely found under windows2003 could not be used, and in a normal set windows2003 parameters (mainly refers to open the video acceleration, sound card acceleration, DX full functionality and optimize background and optimization of the foreground program settings, etc.), windows2003 no worse than under XP.
7, system security, it should be said with regard to the maturity of friends computer, windows2003 security is far higher than XP, the computer not familiar friend, XP and windows2003 no security, huh, huh, open system comes with retrofitting Skynet firewall or, better (recommended not to use the system comes with a firewall, the gadget features too bad point, Skynet, features strong, simple to use).
8, are strongly recommended mirror backup of your system. In particular, its parameter windows2003, something most people don't know what to use, if arbitrary adjustment is likely to come up with the Scout leaders, technology is not a very good friend, some set windows2003 is not to fiddle with.
【 Weak current college 】 computer speed-up tactics don't waste your large memory (trainers)
More memory, faster machine? I think most people answer is Yes, the prompt to 512M 256M is obvious, so take it for granted, from 512M to 1 g upgrade will obviously. But I used my personal experience to tell you, 1 g memory slower than 512M also, of course, the premise is that you do not set.
The other day I put my CompaqN410c expanded to 1 g RAM, 2 × 512Mpc133 SD, results not only extended to find machine as before, or in the same, a little card and sleep time get longer, it is in the affirmative, sleep is to copy the contents of memory to the hard disk, memory, sleep time must longer, it makes me depressed, I spent more than 500 upgrade my machine, but slower than the original. I used this software memstate real-time monitoring of my memory, discovery has been more than 600 megabytes of free memory, memory of the machine is very adequate, even many are wasted, but machine for what still so slow? so I went to google to find reasons, found that many people have found this problem, and have the authority to explain, here I put the key part excerpt out, combined with their own experience to share with you is used. Note: this change as well as the use of methods for XP system.
Modify the registry to play large memory advantages
Now open the registry editor, locate the [HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SessionManager\MomoryManagement], in the right pane, modify the key values (notably, do a set of prerequisite is the best memory exceeds 512MB and Windows2000/XP only).
(1) "LargeSystemCache" (start a large system cache): in memory to open up a huge memory space for disk file system read-ahead. When the program is a continuous increase of data requested, Windows automatically by the system cache, so that read-ahead with maximum speed Gets the desired data. Because this system buffering enabled more of physical memory, which makes use of the program can be used to reduce the physical memory. Set its value to 1. In this way, the system cache to increase from 4MB 8MB.
(2) "SecondLevelDataCache" (enhanced CPU performance): CPU processing speed is much larger than the access speed of memory, and memory and much faster than the hard disk. This CPU and memory, memory and disk between a performance bottleneck, the previous "LargeSystemCache" in order to alleviate memory and disk bottlenecks, and the CPU in order to be able to quickly process data from memory gets also sets a buffering mechanism L2Cache (L2 cache). Adjust this value allows Windows to better cope with the CPU utilization of the caching mechanism for greater data pre-fetch hits. Recommended that this be set to 512.
(3) DisablePagingExecutive (disable paging file): sets its value to 1 (hex), this will make all programs and data mandatory qualification in physical memory to run, instead of using virtual memory. Obviously, when there is enough physical memory to complete the desired task, doing so will make the system performance is greatly improved. For memory only 64 MB of user, enable it perhaps disaster – system error until the crash frequently.
(4) "IOPageLockLimit" (custom input/output buffer size): input/output system is a device to transfer data between the microprocessor and the channel, while expanding its buffer size data transfer will be more smooth. Similarly, the specific set of dimensions depending on the size of physical memory and how to determine the running task, generally speaking, if the memory to the 64MB double-byte key value is set to hex (1MB) 400, 800 (2MB) or 1000 (4MB) 128MB memory can be set is 1000 (4MB), 2000 (8MB) or 4000 (16MB); 256 MB 4000 (16MB) or 8000 (32MB). Of course if you have more memory, can set it to 10000 (64MB) or more. When set to 0, Windows will automatically configure.
【 Weak current College 】 memory plug common problems and solutions
Panoramic view of the current memory market, brand new digging really many, in memory of frequency, now DDR266, DDR33 memory has slowly fading out of the market, mainstream DDR400 price and the former has not gap, but DDR2-667 memory has become the main force in recent market.
Although DDR2 memory has become mainstream, but DDR memory still upgrade the user's preferred, especially the Vista operating system on the memory capacity requirements increase, the giant many early 939, 754-pin of the user only through upgrading memory to smooth running VISTA system.
Many of the old user's machine, and match is DDR266 memory, but has been unable to buy into this frequency of memory chips, so most of my friends bought DDR400 memory, but since these two do not match the memory frequency, tend to have some trouble. In addition, many users buy memory stick after discovery and machine mounted memory model is not consistent, which also cause various problems, the next step towards the use of different models and sizes of memory fault-prone of all kinds are summarized below.
First, the computer does not boot
This is to use different sizes of memory stick a widespread problem, this is the case generally have three solutions:
Article 1, replace the memory. This is the most direct way. If you are purchasing a larger-capacity high-frequency memory stick, you can first be original smaller memory is removed, the new purchase into the machine, if you are able to post, then go to the motherboard's BIOS will memory frequency down to motherboard supported memory frequency value to block the use of, this is generally not wasted, but stability is better, generally do not cause problems. (Note the chipset to support different memory frequency, such as older 815 series chip can support DDR266 memory, so if you buy DDR400 memory have fallen over. )
Alternatively you can set the old memory tiaocha to motherboard memory slot a top position, i.e. twoslot to plug in the memory slot and a location so you can use the computer power on every once in a while.
2. the use of a separate will power on the computer, then enter the BIOS Setup, and memory-related settings in accordance with the specifications of the low speed and memory. For example: use of a memory (DDR266 and DDR400 memory mixed use, it is best to use DDR266 memory), start your computer, enter BIOS settings and memory frequency and response time slow to run old memory can stability prevail, shutdown after inserting a second root memory to make two memory remains the same frequency.
2. computer precariousness, often panic
Computer running unstable such problem appeared mainly memory compatibility, solve the basic idea is the same as above. The first is to replace the memory location; second, turn off the memory in the BIOS by SPD automatic configuration option changed to manual configuration. Third, if the motherboard with I/O voltage regulator, voltage can be increased as appropriate, strengthen memory stability.
Dual-channel memory access times, different models of memory together form a dual channel more capacity result in system instability phenomenon, this is because different manufacturers ' products are designed not to make use of technology, and the dual-channel memory requirements quite high, so if you are in the form of dual channel deadlock occurs frequently, such as instability, you can not set up for dual-channel functionality to test, if not you can in this way.
3. plug or upgrade memory stick, memory capacity, identify improperly
This might be caused by generally have the following:
The first may be the cause of the motherboard chipset itself, some old motherboards only supports 256 MB capacity (e.g. intel i815 series highest only supports 512 MB of memory capacity), the excess part does not recognize and use. Of course there is the result of Board cannot support high memory particles, the solution to the problem, the only way is to replace the motherboard or memory. In addition, in some cases by adjusting the memory of the insertion order or you can resolve this issue, we encountered this kind of problem you can try it yourself more.
Memory plug instability problems is an old problem. From the EDO to SDRAM and DDR, such problems persist. Therefore, although the high frequency of large-capacity memory while prices and low frequency difference is not great, but we buying initially or from the motherboard and the angle of the old memory, see the motherboard supports memory capacity specifications, and the memory of the brand and model, the old memory possible.
Markets a wide variety of memory, its compatibility also different, big brand product compatibility will do quite well, so try to buy some brands of memory, such as Kingston, jinbang, their electrical compatibility in General is better, there is a problem with the chance to be lower.
If the comparison focuses on price, you can purchase general memory, but try to choose wide PCB's memory, the memory of exclusion is not like the narrow strip that is within the PCB from the stability and compatibility is better, the price difference is very small.
Subscribe to:
Comments (Atom)