Tuesday, February 22, 2011
【 Weak current College 】 grayware symptoms and prevention methods
As viruses, worms, Trojan horses, backdoors and blended threats of floods, the current address new vulnerability resulting speed much faster than before, but the social engineering (socialengineering) trap has also become a major new attacks. With social engineering attacks to trap elements including spyware, phishing, email-based attacks and malicious Web sites, etc. These attacks often masquerade as legitimate applications and email information, designed to deceive users expose sensitive information, download and install malicious programs, traditional security device is difficult to stop, often require advanced detection and security technology. This article focuses on the characteristics of gray software and protection methods.
1. What is a grey software
Grey software is a general term, it is installed on your computer to a destination to track or report-specific information that a category of software. The software is typically not being allowed to install and execute. Many grey software is needed to download and run the application you unconsciously completed work, such as tracking computer use, theft, privacy, etc. In a large number of e-mail virus become monthly news headlines, users may be aware that if you open a message that is not to determine what risks. But for grey software, users don't need to open an attachment or execution of the infected program, the only access using the technology of the Web site, it will become a victim of grey software. Many grey software only generated spam, for example, a pop-up window. It is true that in the grey "harmless" and stolen credit card account number of the software, passwords and social security numbers of these valuable information, or between an attack there is a clear distinction between standards.
Grey software often comes from the following acts: (1) download shareware, freeware or other forms of shared files; (2) open the infected by mail; and (3) click the pop-up ads; and (4) access to irresponsible or spoofed Web sites; (5) to install a Trojan.
Grey software is not malicious software. Many grey software ultimate goal is to track visitors to your Web site to obtain search results, to achieve a business objective. Typical symptoms of grey software is the system slow, pop-up ads, redirect to a different Web site home page, causing a disturbance. However, hackers often put gray software technology used for other purposes, such as the use of the browser to load and run some programs. These programs can open access to the system, collecting information, tracking keyboard input, modify settings, or create some damage.
Grey software in General can be divided into the following categories:
(1) adware: Adware is usually built into the user free to download and install the software. Installation will occasionally pop-up browser window to disseminate advertising, interfere with the normal use of the user.
(2) spyware: spyware is usually embedded in free software. It can track and analyze user behavior, such as users browse the Web. Tracking information is returned to the authors of the site, where logging and analysis. It will cause your computer's performance.
(3) dial-up software: dial-up software is to control the computer's Modem grey software. These programs are usually expensive long-distance or call the phone number to generate income for thieves.
(4) joke software: joke software to modify system settings, but does not destroy the system. For example the system mouse or Windows background picture be modified also some games software usually is some jokes or hoaxes.
(5) peer to peer software: peer to peer (P2P) software to complete the file exchange. Use it to accomplish business objectives may be legitimate, but use it to Exchange illegal music, movies and other files, often illegal.
(6) keyboard recording software: keyboard logging is perhaps the most dangerous one of grey software. These programs can capture keyboard input, thus obtaining a user name and password, credit card number, is used for Email, chat, instant messaging, etc.
(7) the hijackers software: it can modify the browser settings to change the user's hobbies, such as Home, Favorites or menu. You can even modify the DNS settings, DNS redirection to malicious DNS servers.
(8) plug-ins: plug-ins to add code to the existing procedures or new features, to control, record and send browsing preferences or other information will be sent to an external address.
(9) network management software: it is designed for malicious purposes, you can change the gray software network settings, network security, or cause damage to other networks. Remote administration tools is to allow external users to remote control, change and monitor computers in your network.
(10) BHO: BHO is as an ordinary software dll files installed, you can control the behavior of the InternetExplorer. Not all of the BHO is malicious, but it has a tracking browsing preferences and collect additional information.
(11) toolbar: it can modify the computer's toolbar features, you can monitor the habit of browsing the Web, send information to the developer, or change the host's capabilities.
(12) download grey software: it users unknowingly secretly download and install additional software. These programs are usually run during the boot process, you can install adware, dial-up software, and other malicious code.
Second, the symptoms of grey software
Grayware symptoms manifested in the following areas:
(1) performance degradation. Typically, the process of grey software is that users don't know. It takes up a lot of CPU and memory resources, lead to slow down. Open the Task Manager to view the resource-intensive process, General resistance can identify grey software.
(2) even in the absence of any online program, Cable or DSL Modem to send and receive data in light of, or the network card or a Mod in the taskbarEm's icon, also in non-stop flashing, it means that data is being transmitted.
(3) in not connected to the Internet, or is not running the browser, the computer will pop-up Windows and advertisement information.
(4) the browser's home page without notice from default into another page, modify it to work.
(5) InternetExplorer search engine, search results are always point to a search URL is not specified.
(6) Web browser's Favorites is modified, you cannot change it back, or cannot remove the newly added entry.
(7) the search or the Web browser's toolbar is modified, the new option is installed, but these toolbars cannot be deleted.
(8) antivirus programs, anti-grey software program is forced to stop working, popular security software is turned off. Application run-time warning lost files, even if the file is overwritten back also has no effect. Before you can close the popular security software.
Third, grayware protection methods
1. user education
User education is the most basic method is to allow the user to understand features and grey software to prohibit harmful downloads and installs the software of dubious. Or to allow the download and installation of unknown program, read the "end-user license". Malicious tendencies of grayware and Trojans often try to hide them, protect them from being clean or quarantine. Reduce the chances of infection is another way to improve your Web browser's security level configuration like Outlook which e-mail program to not automatically download pictures in an HTML message or other content, turn off automatic preview on all operating systems and application software is the latest patch, etc.
2, install anti-spyware program
New grey software and your computer's antivirus software functionality is similar, they can be based on the number of eigenvalues of grey software and signature detection, removal and frozen grey software. Gray software program and host-based client software and network-based software against grey. Host-based cost of client software to install and maintain, including installation on each computer, a scheduled upgrade software and virus database. Due to the use license, the entire enterprise deployment costs more.
In addition, a lot of Trojans and grey software before installation will proactively detect if these protection software, if any, is closed off, so you can avoid being detected. So there is a certain risk.
Network-based software against gray is in the enterprise network to connect to the Internet's border platform, deployed against grey software products. In grey software into the network to identify and clear before, install, maintain and keep updated costs. Gateway to get upgrades, all firewall after the computer is automatically protected.
【 Weak current College 】 unified Windows desktop configurations to improve operational efficiency
On a day-to-day basis, business users may want to use any intranet, a computer can have its own familiar working environment. In other words, because the work needed (such as a conference room for meetings requires use of temporary computer), employees use a different computer when you log in, the staff is rendered before the user's desktop, shared folders, and other employees in their work environment. In other words, employees use a different computer, as long as the employee's user name is the same, it should use the same profile. To achieve this purpose and is not a myth. Windows operating system provides a method called "roaming user profile" file strategy to achieve this objective.
I. three differential analysis of the configuration file.
In Microsoft's operating system, its default provides three configuration files for local user profiles, roaming user profiles, mandatory user profiles, and so on. These three profiles each have their own uses. As a Microsoft systems engineer, to understand these three profiles features and differences, and then the actual needs of the enterprise, select the appropriate configuration file.
When users first log on to the steering group system, the system will be used to automatically create a "local user profile." That said, the operating system will take the user's desktop, network folder etc configuration is saved in the local user configuration file for use the next time you login. However the local user profile is different for different computers, changing a word that each user on a different computer (even if the user name the same) have different local user configuration file. It is this profile does not meet the above requirements.
Mandatory user profile is the system administrator preconfigured, when the user logs on to the user configuration file take effect. When an employee logs on while it is possible to adjust the desktop settings as needed, but when the user logs off, these changes are not saved to the mandatory user profile. That is, to use mandatory user profiles, each time you log on to the operating system is using fixed desktop settings, the adjustment of its follow-up will be lost. To do this configuration file will not be able to meet these needs.
If the system administrator wants to domain users to the domain of any computer logs on, the system is the user's own work environment, we can use the same configuration file to have the same desktop settings, you need to store on the server a roaming user profile. When an employee logs off from the system, desktop configuration changes (such as adding a link to a network-shared file shortcut) will be automatically saved to roaming user profiles. So the next time you log in again when employees of this operating system, the system will take this changed a roaming user profile to set the desktop environment. This is what I have to recommend a configuration file, it can let the enterprise employees when and where you can have the same working environment.
Second, to domain users specify a roaming user profile.
Typically, system administrators can use two ways for a user-specified roaming user profiles, respectively to the user specified an empty roaming profiles and give the user to specify a preconfiguration of the roaming user profile. Since the two are very much the way the configuration process, so the author "to the user specified an empty roaming user profiles", for example, talk about this specific configuration process.
Suppose now the enterprise has the following requirements. Enterprises have a sales manager in its domain user account as SA001. As a result of its work, the sales manager would like their use of account SA001 in-house any one of your computer when you log in, all want to see is their own desktop environment. To achieve this, the how to configure?
Step 1: first in the file server on one UserShare "shared folders". This shared folder is used to store enterprise within the domain user account of the roaming user profile. At the same time in order to guarantee the user's desktop configuration changes can be saved to the shared folder, the writer also adjusted the associated permissions. Allow the user to this shared folder to change permissions. Because the author is in NTFS file system, so by default on domain users is not change permissions. For this reason the author emphasized that we must allow the user to the contents of this folder. Otherwise, the user's desktop to change configuration will not be able to successfully saved to the server, or even cause the desktop configuration to be lost.
Step 2: create the user information. Shared file set, the system administrator wants to use the domain administrator to log on to the domain controller. Then open the "start" and "management tool" and "Active Directory users and computers" window. And then in the window to create a user account. Account creation is finished select the "Properties", open the configuration file labels. In profile path, specify the store the roaming user profile path, that is just the first step to set the address of the shared file, such as \\192.168.0.3\UserShare\SA001. Where is file server 192.128.0.3 IP addresses as shared folder UserShare, SA001 is the system administrator to specify the name of the folder. In order to facilitate the management, the folder name is a good idea to talk to the same domain user name. This folder does not need pre-existing, only need to specify a folder name. By the time the system will automatically be created.
Step three: roaming user profile initialization. The above two steps to complete, when the Sales Manager to SA001 account to log on to the domain of any computer, the operating system from the second step in the definition of a shared file, create a roaming user profile jacket. This folder name is the name of the folder specified above. Note that the user first logs on, the folder will not have any data. In other words, when the user is the default user profile, not the roaming user profile. If the Sales ManagerRoom for the first time on this computer is logged on, the work environment is the system's default configuration. If the sales manager was previously on this computer, login (set up roaming user profiles before), you use a local user profile. And then when the user logs out of the operating system, its desktop settings (may not have made any changes) will be stored in a roaming profile. After sales manager regardless to the network of any computer to log on to the domain, the system will read the roaming profile and take advantage of this configuration file parameters to initialize the user's work environment. In addition it should be noted that, apart from the user's desktop configuration is saved to a roaming profile, also be saved to the local configuration file. So, even if due to reasons such as network, resulting in a roaming user profile cannot access, users can still use the local user configuration file to initialize the user's desktop environment.
Third, the user's roaming profile usage restrictions.
Because a roaming user profile is stored on a network server, so when users from any domain or computer when you log in, he can read into the configuration file. But when the user logs off, the desktop's changes are automatically saved to the server on roaming user profiles. Business users regardless of which one you next to the computer when you log in, will be to change the settings to configure the working environment. However a roaming user profile environment is not perfect, its main application by three.
A roaming user profile only applies to domain users. That said, only the Microsoft domain environment can use roaming profiles. Local computer user is unable to use a roaming profile. This is mainly because a roaming profile is saved in the domain of a server, and only domain users to the domain of the computer to log on and read the server configuration file in the roaming.
Second, it is only when the user logs off the desktop configuration changes will be saved to the configuration file. If there is a staff now, its just on the desktop, new point to a shared file on the network. In the absence of cancellation before the configuration not saved to the roaming profile. At this point if this employee suppos off to the room for a meeting, then the most recent changes will not be adopted. Because of this change has not yet been saved in the roaming profile.
Third, because roaming profiles are stored on a network server, and not stored locally. So if the corporate internal network instability or heavy, you use a roaming user profile to initialize the user's desktop environment, you may need to take a long time. As this system engineers in the deployment of roaming user profiles, it is a good idea to first assess your network environment. Determine how to provide a fast, stable local-area network.
【 Weak current College 】 58 species of network failures and their solutions (1)---Power By 【 China power house network 】
1. failure phenomenon: the network adapter (NIC) settings are in conflict with the computer resources.
Analysis, excluded: NIC resources by adjusting the IRQ and i/o values to avoid computer-other resources conflicts. In some cases also by setting the motherboard jumper to adjust and other resource conflicts.
2. the symptoms: Internet LAN other clients in the "network places" can see each other, and only a computer who can not see it, it can not see the other computer. (Premise: the Internet's LAN through a HUB or switch into a star network)
Analysis, troubleshooting: check this computer system is working; check this computer's network configuration; check this computer's network connection is working properly; check this computer's network card settings and other resources are there conflicts; check the network cable is disconnected; check the network cable connector contact correctly.
3. failure phenomenon: Internet LAN in two segments, one of the network segment of all computers are not on the Internet. (Premise: the Internet's LAN through two HUB or switch to connect two network segments)
Analysis, excluded: two segments of the route is broken or trunk ends bad places. Check the server settings on the network segment.
4. symptoms: Internet LAN in all the computers in the "network places" can see each other. (Premise: the Internet's LAN through a HUB or switch into a star network)
Analysis, troubleshooting: check the HUB or switch is working.
5. failure phenomenon: Internet LAN a client in the "network places" can see the server, but is not on the Internet. (Prerequisite: server refers to the proxy Internet LAN other aircraft on the computer on the Internet, following the same)
Analysis, troubleshooting: check the client TCP/IP protocol settings, check the client in the IE browser's settings, check the server for the client's settings.
6. failure phenomenon: Internet cafes throughout the local area network on all computers are not on the Internet.
Analysis, troubleshooting: Server system is working; the server is off line; the modem is working; Central Office work is normal.
7. failure phenomenon: Internet LAN in addition to the server can access other clients do not have access to the Internet.
Analysis, troubleshooting: check the HUB or switch is working; check the server and the HUB or switch connection network components (including: network card, network cables, connectors, network configuration) is working; check server proxy surfing software for normal startup run; setting correctly.
8. failure phenomenon: a dial-up operations, MODEN no dial voice, always connect the light on the Internet, MODEN nor Flash.
Analysis, excluded: the phone line is busy; then the server connection MODEN (including: wiring, connectors) is normal; if the normal telephone line, there is no noise disturbance; dial-up network configuration is correct; MODEN configuration settings are correct, check the dial-tone in tone or pulse mode is normal.
9. trouble phenomenon: the system cannot detect MODEN (if MODEN is normal).
Analysis, excluded: reinstall again MODEN, took note of the communication port in the correct location.
10. failure phenomenon: the Internet connection is too slow.
Analysis, troubleshooting: Check Server system settings in the "dial-up networking" port connection speed is the maximum value is set; lines are functioning; you can optimize the settings of the MODEN to increase connection speed; by modifying the registry can also improve Internet access speeds, while the Internet is a lot of the client; if so many, but the connection speed is too slow is normal.
11. failure phenomenon: on the computer screen appear "error 678" or "error 650".
Analysis, excluded: the General what you dialed server line is busy, busy, temporarily unreachable, you can enter a post-session continue to redial.
12. failure phenomenon: on the computer screen appear "error 680: no dial tone. Please check your modem is properly connected to the phone line. "Or" Thereisnodialtone. MakesureyourModemisconnectedtothephonelineproperly。 "Prompt box.
Analysis, excluded: testing the modem is working properly and that it opens; check whether the normal telephone lines, is properly plugged in to the modem connector is loose.
13. the failure phenomenon: on the computer screen appears "TheModemisbeingusedbyanotherDial-upNetwordingconnectionoranotherprogram. Disconnecttheotherconnectionorclosetheprogram, andthentryagain ".
Analysis, troubleshooting: check to see if another program is using a modem, check the modem and port for the conflict.
14. failure phenomenon: the computer appears on the screen "Thecomputeryouaredialingintoisnotanswering. Tryagainlater ".
Analysis, excluded: telephone system or line is busy, dial later.
15. failure phenomenon: on the computer screen appears "Connectiontoxx.xx.xx.wasterminated.Doyouwantto reconnect?" In the prompt box.
Analysis, excluded: phone line interrupt enable dial-up connection software and ISP host connection is broken, try again later.
16. trouble phenomenon: the computer appears on the screen, the "ThecomputerisnotreceivingaresponsefromtheModem.CheckthattheModemispluggedin, andifnecessary turntheModemoff, andthenturnitbackon".
Analysis, troubleshooting: check the modem's power is turned on; check with your modem connection cable is properly connected.
17. failure phenomenon: the computer appears on the screen "Modemisnotresponding".
Analysis, excluded: indicates that the modem does not answer; checking the modem's power is turned on; check with your modem connection cable is properly connected; modem is damaged.
18. trouble phenomenon: on the computer screen appears "NOCARRIER" tips.
Analysis, troubleshooting: indicates that no carrier signal. This isa non-graceful shutdown of the modem or telephone line failure; check with your modem connection cable is properly connected, check the modem's power is turned on.
19. the failure phenomenon: on the computer screen appears "Nodialtone".
Analysis, excluded: indicates no voice dialing; check your phone line and modem is properly connected.
20. failure phenomenon: the computer appears on the screen "Disconnected" when prompted.
Analysis, troubleshooting: indicates that terminates the connection; if the prompt appears in the dial-up, check the modem's power is turned on; if the tip is to use the process, check the phone is in use.
21. the failure phenomenon: on the computer screen appear "ERROR" in the prompt box.
Analysis, error information is excluded:; modem works properly and that the power is turned on; the executing command is correct.
22. failure phenomenon: on the computer screen appears "Anetworkerroroccurredunabletoconnecttoserver (TCPError: Noroutertohost) Theservermaybedownorunreadchable. Tryconnectingagainlater "when prompted.
Analysis, troubleshooting: indicates that a network error, it may be that the TCP protocol error; there is no route to host or the server is shut down and cannot connect, then only try.
【 Weak current College 】 CAD drawing skills (1)
1. in the AutoCAD sometimes turn * point marked on the mouse to click the Office, use a command that prompts BLIPMODE line input OFF will remove it.
2. some users use AutoCAD will find command in the dialog box will prompt line, such as a print command, control, it is a system variable CMDDIA, close it.
3. ellipse ellipse command is generated to polylines or ellipse to entity is determined by the system variable PELLIPSE, when its 1 PLINE ellipse is generated.
4.CMDECHO variable determines whether the resulting command line echo, its implementation in the program should be set to 0.
5.DIMSCALE determines the proportion of dimensioning, its value is an integer, default is 1, the graphics have a certain scale should preferably be changed to scaling.
Stop the entity two 6.BREAK open, select the second point, use the "@" to answer, the first point to be separate entities.
7.CAD higher version provides the shape and position tolerances, roundness and axiality enough round in circles, in fact, the definition of common symbols in AutoCAD are AutoCAD installation directory SUPPORT subdirectory gdt.shp file, 2, and 4 characters defines a circular shape, the circle radian was 127 °, but not very good mend (such as read 90 ° more does not look good).
8. hollow characters such as the use of the BONUS features AutoCADR14 (be sure to fully install AutoCAD, or custom installation select it), there is a command that can be TXTEXP text fried as lines to do 3D characters.
9.AutoCADR14 of BONUS has a ARCTEXT command for arc text output, use the method is first selected arc, then enter the text content, press OK.
10.BONUS also has a useful command, that is, use it to MPEDIT multiple lines together to polylines, and then change its width.
11.image command in R13 R14 in place of the BMPIN, in order that such PCXIN bitmaps embedded file, only used to display, such as explode into empty frame, how to reproduce the PCXIN commands? please install directory R13 RASTERIN.EXE copy-R14, appload mount it and then you can import a bitmap (editable, you can explode).
12.BREAK command to interrupt the entities, the user can also be a little disconnected entities, usage is on the first point to select, enter the "@". Commonly used a line segment is dashed, another section as solid lines.
13.AutoCADR14 provides extensive command abbreviations, abbreviations in many R13 commands also have initials, the following provides CAD single-character abbreviation: A:ARC, B:Bmake, C:Circle, D:ddim, E:erase, F:fillet, G:group, H:bhatch, I:ddinsert, L:line, M:move, offset, P:pan, R:redraw, S:stretch, T:mtext, U:undo, V:ddview, W:Wblock, X:explode, Z:zoo, extensive use of, use will be found faster than point (especially in 1s transmission speed of 5 characters). Substantial expansion of simplified AutoCADR14 commands, not only adds to the first letter of a simplified command (not listed), but also increases with the first two letters of simplified command commonly used such as: array, copy, dist, donut, dtext, filter, mirror, rotate, pline, trim, scale, snap, style, units, etc., more enhanced keyboard input command, to become familiar with the keyboard's friend, is simply a menace.
14.AutoCADR14 command abbreviations also available in R13 by AutoCADR14 Support subdirectory under ACAD.pgp copy to AutoCAD
R13 subdirectory of Support.
15.AutoCAD ACAD.pgp file is very important in that it records command abbreviation content, users can customize their format: <命令缩写> * command name. You can also define a system command, the command sh AutoCADR14 provides, you can execute DOS commands, but in Windows.
In NOTEPAD, 16.AutoCADR14 EDIT, DIR, DEL, system commands, I believe that where NOTEPAD on custom CAD use larger, but it will find screen Flash (in DOS), and returns that are the unhappy people, let's make a small program, named note.lsp: (defunc: notepad () (startapp "notepad"))
First put the NOTEPAD ACAD.pgp command defines the rows to delete, reentrant CAD, then this program with the command: (load "note") into the next with NOTEPAD command will have better results, it is best to (load "note") to join the Support subdirectory of ACADR14.lsp.
Print line width 17.AutoCADR14 by color setting, this mechanical drawing of various style, line width different lines can be placed in a different layer to layer defines the style and color, while in the Print Setup settings line style and color of the relationship and the results were very good.
18.AutoCADR14 's SuppOrt ACAD.dwt is the default template in, processing it, the commonly used layers, blocks, callout types defined, plus the standard figure box, you can save a lot of duplication of work.
There are many external 19.AutoCAD Lisp command file, you can watch them directly, if you learn to develop Lisp applications, note: R14 but the last version of Lisp file content disclosure of AUTOCAD in Lisp file content in CAD2000 is encrypted (the author is working on decryption program).
The second development tools 20.AutoCAD, Lisp has a long, R11 provides ADS (AcadDevelopsystem), R12 for ADS on the real-mode C compiler (such as BC, MSC) support, R13 provides ARX (AcadRuntimeeXtend), R14 provides this Automation enables VBAutomation VB write CAD programs possible, eager to CAD programming has been one of the best choices, you do not have to learn the ADS, ARX, ObjectARX, and AutoCAD AutoLisp, joined with the programming world.
21. user custom Lisp file to automatically load the AutoCAD, so you need to add the user acadr14.lsp Lisp file load statement, acadr14.lsp (earlier version acad.lsp), like DOS Autoexec.bat, be sure to take advantage of, such as defining a S:: STARTUP () function to automatically run it (to CAD plus a picture how to enabled, the available STARTUP plus startapp function, can also be combined with your login password).
22. will insert AutoCAD graphics in a WORD, sometimes found round into a regular polygon, use a command, it VIEWRES is set too large, you can change the graphic quality.
23. the form, such as f30H11 () mark how to the callout, please enter the text content of the "%% c30 {H11 () {\\H0.7x; \\S + 0.1 ^-0.2;}}" , You can implement, as too cumbersome, compiling a program to simplify operation.
In the file as 24.AutoCAD block insertion in other documents, but so too many block so that the file is too large, use the PURGE to remove them, clear a layer at a time, be sure to use a few times!
The contents of the help file 25.AutoCADR14 is very rich, many of these "books", composed of layers of open, read their usefulness is big, including CAD, than any CAD encyclopedia also whole, do you want your help to join, please modify acad.cnt, join their help.
26. in may, in accordance with the regulations in CAD fix .ahp CAD help file, R14 by ahp2hlp.exe it into .hpj file and .rtf file, and then use HelpWorkshop tool (in the VC5) will open the project, compiled to .hlp files.
27. in AutoCAD with some DOS exe files in R14 still uses slides with Slidelib.exe for libraries, mc.exe enables menu of compilation.
28. in the finished parts to assemble the parts after the welding block insert, and then open group group after Assembly, then use the Select command control group ddselect is inscribed status, cancel the group selected may be a member of the group to cut, delete, modify, to move the parts then open Group status.
29. in the menu source file in AutoCAD as a .mnu file and modify it to add your own commands to the menu, and then use the menu command to mount, you can participate in AutoCAD help understand menu file format. Icon on the toolbar to add your own commands for relatively simple, you can right-click on the point, in the toolbar, point to the new button, enter the tool bar, a new tool bar, then choose Customize button, the selected custom, the empty button onto the toolbar, and then in the blank button on the right, so that you can defineyour own button image and commands.
30.AutoCAD status lines can also be customized, using DIESEL languages can access it, the easiest method to use when entering modemacro command to $ (getvar, clayer), beyond the current layer name is displayed in the status line, the user of it all!
31.AutoCAD graphics format .dwg, can also be exported as .bmp, .eps, and .wmf or .dxf, .3ds, if you use the render command can be saved as .tga, .pcx, .tif format, AutoCAD you can also save the file directly to a format that you want to install to the system named "Rasterfileexport" printer, use it to print to a file, the file can also be ACAD2000 saved as JPG format.
32.render is colored, render no off button, users can: (arxunload "render"), because it is an ARX file extension functions.
33.dimzin system variable'd set to 8, then the default values in the dimension does not end with a few zeros users directly accept the default value is very convenient.
34. in the event of failure, such as shortcut keys ^ o loss of function, become orthogonal mode switch, please use the menu to be currently using menu .mnu menu source file reload again.
35. in multiline text (mtext) command in the edit text with Word97. Mtext multiline text editor is AutoCADWhat's new in R14, it provides Windows word processing software of the interface and work methods, it can even take advantage of the powerful features of Word97 to edit text, this feature can be used as follows: open the "Tools" menu select "Preferences" command, "Preferences" dialog box pops up, open "Files/TextEditor, Dictionary, andFontFileName/TextEditorApplication/Internal", double-click on the "Internal", "dialog box appears" Selectafile, he went on to found the "Winword.exe" application file, click "open" button, then click "OK" to return. After completing the above setup, users like to use mtext command system will automatically call our familiar Word97 application, text for AutoCAD.
36. using custom tools button.AutoCAD in lsp file can provide us with very useful commands, such as chtext.lsp is a good text modification commands, especially for large quantities of text changes, but use this command must be preceded by the lsp file loaded. Usually you can select the "Tools" menu, "LoadApplication ..." option, and then use the dialog box open AutoCADR14/Support of Chtext.lsp file, and then click on "Load" button, or you can directly in the command line, type "(load" chtext ")" to achieve the purpose of loading, so do some cumbersome. Here we use a custom tool button on the way to solve this problem, right-click any of the Tools button, pop-up dialog box "Toolbars" and click "Customize ..." button in "Categories: choose" Custom "," item appears in the empty button onto the target location in the sidebar, click "Close" button to return to, and then right-click the empty button appears "ButtonProperties" dialog box, in the "Name:" bar as a command button named, "Help:" bar you can write or not to write content, and then in the "Macro:" type "(load" chtext "), as regards the" cht "ButtonIcon", user-selectable system icons, you can also Edit point "..." to draw or a direct call to existing bmp file, the last point of the "Apply" button and then close the dialog box returns. So you've made work button. Because behind increased "cht" (Note: there is a space in front of you), so you just press the tool button you can directly go to select the file you want to edit.
37. "Stretch" command is also a commonly used commands, enter the command, the system always prompts "selectobjecttostretchbycrossing_windoworcrossing_polygon ...", requires you to enter a "C" before you can use the mouse to select the destination. In order to simplify the operation, the user only needs to be a system-supplied tools button to do some small modifications. Right-click any of the tool button pop-up Toolbars "dialog", and then right-click the "stretch" tool button popup "ButtonProporties" dialog box, in the"Macro:" box "^ c ^ c_stretch type a space after" and "C". After you click the Tools button you can directly select the destination.
38.AutoCADR14 users typically uses the system gives the default format for filing, the filing of this format is file space, you cannot use low versions of applications (e.g. AutoCADR12, AutoCADR13) open, to avoid the waste of disk space, you can "SaveDrawingAs" dialog box, choose the "Save as type" to "AutoCADR12/LT2Drawing" format. For example: the same dwg file filed in two ways, their size is 87KB, 58KB respectively. Visible difference is still very significant. But the latter file can R12, R13 version opens in an application. In this way to configure a lower user is particularly useful.
39. sometimes open dwg file, the system pop-up "AutoCADMessage" dialog box prompts "Drawingfileisnotvalid", tell the user that the file cannot be opened. In this case you can quit open, and then open the "File" menu, selected "DrawingUtilities/Recover" command, or directly in the command line by using the keyboard to enter the "recover", then "SelectFile" dialog box, enter the file you want to restore, verify that the system starts the restore file operations.
40. the finished menu. The support directory of the file copy to chinese.mnu acad.mnu. Use WordPad to open chinese.mnu. Careful observation will find many similar "* to * the * POP" entries, each entry defines a column drop-down menu. The quotation marks in the English command names changed to Chinese, save and exit. Then enter the R14 "menu" command menu file mount, chinese.mnu dropdown menu becomes Chinese. You can then mount acad.mnu file will restore the menu.
41.R14 default "command to cancel" key "ESC" key, if you're already accustomed to R12 "Ctrl + C"? click on menu Tools\\preferences\\compatibility\\prIorityforacceleratorkeys\\autoCADclassic, then you can use the "Ctrl + C" to cancel the order, while the "ESC" key is still valid.
42.trim command prompts you to select the graphic you want to cut, does not support common window and select a style. crossing When you want to cut the number of line segments, to select multiple times to complete. Then you can use the Select method. fence When the trim command prompts to select the graphic you want to cut off, enter "f", and then draw on the screen a dashed line, carriage return, and be in contact with the dotted line graphics were cut off.
43. click "ObjectPropertys" toolbar "Makeobjects\ ' layercurrent" button, and then select the drawing area to go to the layer of any graphics, current layer immediately transform into a selected shape's layer.
44. with R12 file R14 open, even if the proper selection of a file, or Chinese characters will appear garbled characters due to use of R12 R14 and different code pages. You can download the Autodesk master code page conversion tool wnewcp. Run wnewcp, first select the "R11/R12" check box, and then click the "Browse" button, choose to convert a file or directory, and then select the new code page, or both ANSI936 GB2312, click "start conversion" StartConversion. After conversion, the R14 was able to display Chinese characters correctly.
【 Weak current College 】 wireless encryption of several encryption methods
In the current wireless router with encryption mode: WEP, WPA-PSK (TKIP), WPA2-PSK (AES) and WPA-PSK (TKIP) + WPA2-PSK (AES).
WEP (wired equivalent privacy)
WEP is WiredEquivalentPrivacy abbreviation as defined in the 802 .11b standard for wireless local area network (WLAN) security protocols. WEP is used to provide and wired lan at the same level of security. LAN born than WLAN security, because LAN physical structure to be protected, some or all of the network in a building which also prevents unauthorized access.
Through radio waves of WLAN is not the same physical structure and therefore vulnerable to attack, interference. WEP goal is through radio waves in the data encryption to provide security, like end-to-end delivery. WEP characteristics using the rsa data security, developed by rc4prng algorithm. If your wireless base station support MAC filtering, it is recommended that you use this together with WEP characteristics (MAC filtering is much more than encryption security).
Although the name point of view seems to be a wired network security options, in fact, this is not the case. WEP standard early in the wireless network has been created, the goal is to become a wireless local area network WLAN security protection layer of the necessary, but WEP's performance is very disappointing. Its roots lie in the design deficiencies.
In a system using WEP, wireless network transmission of data is to use a random key for encryption. However, the WEP key used to generate these methods will soon be found predictable, so for potential intruders who can easily intercept and decipher these keys. Even a medium technical level of the wireless hackers can in two to three minutes of cracking WEP encryption quickly.
IEEE802.11 dynamic wired equivalent privacy (WEP) mode is the twentieth-century design in the late 1990s, when the powerful encryption technology as an effective weapon to be United States strict export restrictions. Fear of a strong encryption algorithm to be cracked, wireless networking products have been export is prohibited. However, only two years later, the dynamic wired equivalent privacy mode was discovered there are serious shortcomings. But the 1990s errors should not be when the wireless network security or IEEE802.11 standard itself, the wireless networking industry can't wait for the electrical and electronics engineers revised standards, so they launched a dynamic key integrity Protocol TKIP (dynamic wired equivalent privacy patch version).
Although WEP has proven to be outdated and inefficient, but today in many modern wireless access points and wireless router, it is still supported encryption modes. Moreover, it remains to be personal or company use up one of the encryption method. If you are using WEP encryption, if you are on your network's security very seriously, then later as much as possible not to use WEP, because that really is not very secure.
WPA-PSK(TKIP)
Wireless network security mechanism was originally used was WEP (wired equivalent privacy), but later discovered that WEP is very insecure, 802.11 organizations began to develop a new security standard, which is later 802.11i Protocol. But standards to finally release takes a long time, but considering that consumers would not be to network security and discard the original wireless devices, Wi-Fi Alliance in standard launched before 802.11i on the basis of the draft, developed a technique called WPA (Wi-FiProctedAccess) security mechanisms, it uses TKIP (temporal key integrity Protocol), it uses the encryption algorithm or WEP encryption algorithm used in RC4, it is not necessary to modify the original wireless device hardware, WPA for WEP problems: IV too short, key management, too simple, no valid for message integrity protection, through a software upgrade method to improve network security.
The emergence of WPA give the user a complete authentication mechanisms, AP results based on the user's certificate to decide whether to grant it access to a wireless network; certification success can multiple ways (the number of packets transmitted, the user access to network time, etc.) to dynamically change each access the user's encryption key. In addition, for users in the wireless transmission of packets in the MIC code, ensure that user data is not changed by another user. As a subset of the 802 .11i standard, WPA core is IEEE802.1x and TKIP (TemporalKeyIntegrityProtocol).
WPA considering different users and different application security needs, for example: business users want a high security protection (Enterprise), or it may reveal very important trade secrets; and home users tend to just use the Internet to browse the Internet, send and receive E-mail, print and share files, the user's security requirements are relatively low. In order to meet the different needs of the users of safety requirements, the WPA provided two application models: enterprise mode, family (including small office).
According to these two different application modes, WPA authentication also there are two different ways. For large enterprise applications, often using "802.1x + EAP" means that the user provides the authentication credentials required. But for some small and medium business network or home user, WPA also offers a simplified model, it does not require a specialized certification server. This mode is called "WPA pre-shared key (WPA-PSK)", it only requires that each WLAN node (AP, wireless routers, network cards, etc.), enter a key in advance.
This key is only used to the certification process, and not used to transmit data encryption。 Data encryption key is generated dynamically after the authentication is successful, the system will ensure "a a dense," does not exist like WEP so the whole network share a single encryption key, so greatly improves system security.
WPA2-PSK(AES)
After promulgation in 802.11i, Wi-Fi Alliance has launched the WPA2, it supports AES (advanced encryption algorithm), so it requires new hardware support, it uses the CCMP (counter mode cipher-block chaining message integrity code agreement). The WPA/WPA2, PTK build dependent PMK, PMK is in two ways, one is a form of PSK is a preshared key, in this way in PMK = PSK, and another, requires authentication server and site for consultations to produce the PMK.
IEEE802.11 is developed by the technical standards, Wi-Fi Alliance which is the commercial standards, developed by Wi-Fi commercialized standard basically also complies with the IEEE technical standard developed by. WPA (Wi-FiProtectedAccess) in fact is made by the Wi-Fi Alliance's security standards, the commercial purpose of standards is to support this technology-IEEE802.11i oriented security standards. The WPA WPA2 is actually the second version. WPA is will be two versions of the reasons is that Wi-Fi Alliance of commercial operation.
We know that the task force established 802.11i's purpose is to build a more secure wireless LAN, so the code for the encryption project in two new security encryption agreement – TKIP and CCMP (some wireless network devices to AES, Word to replace AES-CCMP CCMP). With TKIP although weakness for WEP, made a significant improvement, but retained the RC4 algorithm and a basic schema, implying that there also TKIP RC4 itself implies weakness. Thus creating a whole new 802.11i longer, stronger security, better suited for applications in wireless LAN environment agreements-CCMP encryption. So before the CCMP, TKIP is ready has been completed.
But to wait until the CCMP, then publish the complete IEEE802.11i standard, you may still take some time, but Wi-Fi Alliance in order to make the new security standards can be deployed as soon as possible, to remove users on wireless LAN security concerns, thereby allowing wireless LAN market can be quickly extended out, thus using TKIP for IEEE802.11i completed the third edition of the draft (IEEE802.11idraft3) asa benchmark in the WPA. The IEEE is complete and publish IEEE802.11i wireless LAN security standards, Wi-Fi Alliance also immediately released the WPA version 2 (WPA2).
WPA = IEEE802.11idraft3 = IEEE802.1X/EAP + WEP (optional item)/TKIP
WPA2 = IEEE802.11i = IEEE802.1X/EAP + WEP (optional item)/TKIP/CCMP
There is finally an encryption mode is WPA-PSK (TKIP) + WPA2-PSK (AES), which is currently the highest wireless routing, encryption mode, current encryption mode because of compatibility problems that have not been used by many users. Currently the most widely used is WPA-PSK (TKIP) and WPA2-PSK (AES) encryption modes. Believe in encrypted wireless network after, be sure to let our users ease of surfing.
【School】 choose weak commercial performance firewall need to reference.
<br> <BR> 1, the throughput test <BR> The test used to determine the firewall to receive and send data packets without loss in case of maximum data transfer rate, is to test the firewall in the normal operation of the data transmission capacity ., is the basis of other indicators. .It reflects the ability of the firewall packet forwarding. .Because the data stream will result in the loss of a high-level agreements as a significant delay in waiting for a timeout, so that the firewall actual maximum data transfer rate is very useful. .The indicators can also be used to determine firewall device over the stability of their own case load of questions. .<BR> Higher throughput makes firewall more suitable for the network core layer on the flow of demanding network environment, the firewall will not become a bottleneck in network performance will not affect the normal business communications. .<BR> 2, <BR> delay is the delay in testing the test data frame from the last bit into the DUT port until the first test data packet to another port bit away from the device under test interval. .<BR> Indicators for some of the real-time delay-sensitive use, such as Internet telephony, video conferencing, database replication such as the use of very large, so a good indicator for evaluating the delay performance of the firewall is key. .<BR> Delay tests for all frame sizes of 50% and 100% throughput under implementation, is the horizontal comparison of the results of store and forward delay. .Single forward delay (a rule, two GE ports, 2Gbps bi-directional flow, respectively, in 50% and 100% throughput under test). .<BR> 3, packet loss rate test <BR> test used to determine the loss rate at different transmission rates firewall packet loss percentage, the purpose is to test the firewall in the ultra-performance under load. .<BR> For the financial, securities, e-commerce and other industries involved in online transactions, the loss rate of data transmission requires very harsh, even if the system exists within the structure of error correction, proofing mechanism, but a lot of packet loss rate will cause frequent roll .-back action, delay the timely implementation of major transactions, affecting the confidence of traders on the system that led to the loss of customers. .Therefore, packet loss rate index for the banking system to shut the main network. .<BR> For 64 ~ 1518byte the frame size, respectively 40%, 70%, 100% wire-speed test execution. .Single packet loss rate (a rule, two GE ports, 2Gbps bi-directional flow at 40%, 70% and 100% wire-speed packet loss rate under). .<BR> 4, concurrent connections test <BR> the tests used to test the firewall's TCP can establish the maximum number of concurrent connections. .<BR>.
【 Weak current College 】 why each boot file system checking occurs on E
I believe many people have come across a computer after power on
“CheckingfilesystemonE:
ThetypeofthefilesystemisNTFS…… And then there are some figures, the last line is similar to "?? Allocationunitsavailableondisk ", then enter the system desktop".
This is generally a non-graceful shutdown, power off, press the start key to start the heat, or press the power key off the post.
Due to the shutdown of the program E-disc is still running, each boot hard disk will automatically post to eliminate the error message, and if a non-graceful shutdown the program does not exit, then the next time you boot the computer to perform a self-test from new to eliminate eliminate error messages, normal computer once, the next time that you start is not the case.
If each boot all happen there are 2 possibilities: one is the hard disk has bad road, this may be hard drives are already poor, suddenly come across illegal shutdown, disk read and write head due to the impact of the emergency electric current, resulting in a collision with a hard disk, the hard left a bad road, but also be able to use the computer, this is the case generally can only replace the hard drive. A computer is not a problem, but leave the memory of the information, the result self-test every time, eliminate way is: start-to-run, enter chkdskE:/x/f carriage return, and then appeared a dos window automatically-running, and so he ran without problems.
ChkdskE:/x/f mean Windows found E plate there is a problem with the file system
Running CHKDSK <使用选项/x/f> to correct fix these problems
The full name is checkdisk chkdsk is the disk check, it is when your system error or illegal shutdown when called by the system to check the disks. Based on the file system, creates and displays the disk's status report. Chkdsk also lists and corrects errors on the disk.
/x
First of all to force uninstall the drive volume, which drives all open handles are invalid,/x/f also contains a function.
/f
Fix disk errors.
You must lock the drive disk breaks, if chkdsk cannot lock the drive disk breaks, then you will see a message asking whether you want the next time you restart the computer to check the drive.
Report of the computer screen content and post mean
CheckingfilesystemonE: check the E partition file system
ThetypeofthefilesystemisNTFS. file system NTFS
Volumelabeliswindowsxp. the volume name windowsxp
Oneofyourdisksneedstobecheckedforconsistency. one or more partitions, you need to check fix
Toskipdiskchecking, pressanykeywinthin6second (s)-cancelled check, 6 seconds to press a key
(windowswillnowcheckthedis.) Windows start check disk
CHKDSKisverifyingfiles (stage1of3) .......CHKDSK verifying files (progress 1/3)
Fileverifcationcompleted. document verification completed
CHKDSKisverifyingindexes(stage2of3)... Check the index
CHKDSKisverifyingsecuritydescriptors(stage3of3)... Check the security descriptor
Securitydescriptorverificationcompleted.
?? KBtotaldiskspace. GB hard disk space??
?? KBin764files. non file space
? KBin138indexes. indexes take up space 512K
0KBinbadsectors. no error track (if not 0 indicates there may be a problem with the hard disk)
?? KBinosebythesystem.
?? KBoccupiedbythelogfile
?? KBavailableondisk.
?? Bytesineachallocationunit cluster size 4K
?? Totaiallocationunitsondisk. 15360140 clusters
?? allocationunitsavailableondisk
Question mark (?) is a computer with screen appears for some numbers, and local computer hard disk partitions and file sizes, different computer digital is not the same but mean different
For the FAT file system, you can use win its own disk repair to an operation, right-click the drive letter you want to work, property-error-checking tool, select the automatically fix errors check on, click Start.
【 Weak current College 】 make PPT presentations followed by 10/20/30 rule
When you use the PPT, ever do to get better results? some simple rules, often profound meaning, people. Japan famous venture capitalist cover Kawasaki (GuyKawasaki) raises the PPT presentation of 10/20/30 rule:
· Demo file does not exceed 10 pages;
· Speech of no more than 20 minutes;
· Demo uses fonts not less than 30 points (30point).
10 page (s): do not use a lot of content to make your PPT is very full, 10 pages is enough, too much content for people unable to remember key points. But if you are writing to VC (venture capitalist), GuyKawasaki recommendations to write the following 10 points: problems, your solutions, business model, key technologies, marketing programs, competition, teams, business forecasts and milestones, status and schedules, summary.
Themselves more clearly defined structure
Bullets and numbering on the striking beauty of fonts have been instrumental, but PPT default "point" to compare the monotone, we can do it yourself, the need to transfer out?
Tip: do "format → bullet and numbering" command in "bulleted" or "number", select your template in significance, or click the "custom", you can select the new pop-up dialog box on a wide variety of bullets. Style-rich, structured more clearly.
Hyperlink richer
Feel the content is not enough, just in case the customer wants to see detailed information?
Tip: the leaves are effective.
First, select the hyperlink object (text, graphics), click on the "slide show → action settings" or "action button" AutoShape, select a button, drag the graphic button, and then, in the case of the "action settings" dialog box, choose the "hyperlink", select the linked object can be determined. If you change the selected object, enter "Insert Hyperlink", then on the "Insert Hyperlink" dialog box content changes and determine, if selected "unlink" hyperlink to delete.
20 minutes: Although you may have only one hour, but the projectionmay take a long time, the audience may be late or leave early, and the audience interaction and questions and answers are so important, only 20 minutes is a wise choice, but the audience often for more than 20 minute speech will distract and tired.
Rehearse a accurate grasp of the time
Sometimes, we may speak more and more excited, at the end of the time, had to rush at. How to accurately grasp time? to obtain the time guarantee, you can preview their own formal presentation several times before. Enter the "slide show → rehearse timings", you can manually control the playback of a slide, customize each slide play time, very convenient.
Shortcut keys for speed good helper
The show begins, using the lower left corner of the view buttons in several different view (normal view, slide sorter view, slide show) to quickly switch between. Of course, if you press F5, directly into play. By default, press enter or space is next (such as wireless mouse for easy standing State speech), the "←" is a return to the previous page, the Esc is a return to normal view state. Answer questions from listeners or intermission, press the B key directly into a black screen, then press again to restore the status quo.
30-point font: 30 point font, then in the page PPT to how many words does not fit. But that use large font GuyKawasaki write less content in addition to being able to let the audience to see more clearly, it is more important is that this can make you seriously think about their own need to write out what is the main point of view, and to better focus on the key point for elaboration and explanation.
Highlight contrast fonts more eye-catching
Font, not enough light. In the presentation interim adjustment computer settings? no such trouble. In PPT, used to view slides in high contrast.
First enter the Windows "Start → Settings → Control Panel" command, double-click the "accessibility options" icon in the "display" tab, select the "use high contrast check box to determine". And then on the "view PPT" menu, point to color/grayscale "," execute "high contrast" command.
Note: the high contrast setting is for normal and slide sorter view mode to view the slide and thumbnail, it is just a screen setting does not affect the actual presentation, nor does it apply to the printed presentation.
Write more content richer, looks stronger? otherwise. Concerned about the whole PPT logic main line, in the reading process on each PPT in the entire State, communicate with is how to extend along rational logic, the mind has a "bigpicture," which would more rich content such as data, arguments as "attachment", let the body become direct and succinct, in natural and statements, focused, is the absolute principle.
10/20/30 rule, if you think it makes sense to try to change some of their habits.
【 Weak current College 】 Winzip alternative application techniques three
WinZip is the famous compression software, which in a friendly and beautiful interface, convenient usability, higher compression rate won the majority of users to become Windows platforms are the most popular compression tool. However, I do not know if you noticed, WinZip Self promoted to V9.0 version later, except with the specific functions of compression, but also has some little-known feature of another class.
1. clear the temporary file
Usually we when installing or running the application due to improper operation or other unavoidable objective factors, resulting in a hard drive in a legacy of many abandoned, error file information, and save the file path and especially complex, in order to effectively organize disk, folder to remove annoying with the other tools are not necessarily very "all hands", this time may wish to use WinZip's mobile command can effectively remove the temporary files. For example, we have to clear C-up of a temporary file in the c: root directory creates an empty temp.zip file (already have abandoned the .zip file is also available), double-click to open, click on "add" button, pop-up dialog box.
Enter * in the file name column, and then select the .tmp "folder" column of the "include subfolders" item in the "actions" drop-down list, select the "move files", click "move" button to the wildcard character, then the computer "after work", C-up of the temporary file is both clean and thoroughly are moved to the Recycle Bin.
2. backup files
Backup files are our daily computer a fundamental work, but if we want to specify a date by some files for backup, things become more complicated. Due to the large amount of work per day, and the generated file is not in the same folder, the folder you want to enter the time of backup copying the files, and then as they are built with the same name as the folders have to be copied to the backup folder, it is cumbersome. With WinZip you can very easily. Click on "start"/"find" pop-up "find: all files" dialog box, click the "date", respectively, label, select the "find all files" and specify the required backup file, and then press the "start lookup" button, then Windows will comply with the conditions of all find out-and-drop files in the window.
Then right-click the file and from the shortcut menu select "add to Zip file" command; then in the pop-up window select the "Save full path info" option, then click "add" button, one with folder information of compressed files on the backup finished.
If you want to restore the backup file, simply put the Zip file into the root directory of a disk, select after right-clicking the mouse and select "extract to" command, WinZip will compress the files together with the folder along with the release.
3. reading mail messages garbled
Message processing is online at least one of the daily routine, but received a message that you obsessed garbled message to the effect that hard to understand, in fact, WinZip is cracked message garbled in an efficient way. Select garbled message, right-click on the shortcut menu, select "Properties" command, and then in the dialog box click the "details" tab and then click the "mail from" button, then opens mail source code, the content of the message. Continue to right-click, choose "copy", "mail from" copy to the system Clipboard, and then use Notepad to save it as the .uue file. Next run the .uue file for Postfix, WinZip will automatically call and "down" it to garbled message decoding work, which in turn appear correctly coded message of "the truth".
【 Weak current College 】 resolves nine Windows7 do not turn off the service in
I believe we have the name of the Windows7 is very familiar with, it is an excellent place in addition to the inherited and beyond vista's beautiful interface and user-friendly tray, plus eight successful XP compatibility, is the world a good operating system.
Vista's failure in addition to its "powerful" of incompatibility, the second biggest flaw is the accounting resources, but Windows7 at this point a lot of improvement. At the same time, for ordinary users, even the Windows7, service optimization is also a headache for one thing, exactly what services the delete, which do not move? bud use Windows7 optimization guru or Rubik's cube in the Tuning Wizard you can safely disable several of the services. Here we talk about 10 Windows7 cannot close of service, we strongly recommend that you back up the service before tuning.
DNSClient
The official explanation: the DNS client service? den snow cache dnscache?? point the domain name system DNS name and register? snow that the full computer name. If the service is stopped, will continue to resolve DNS names. And then, will not cache the DNS name of the query result, the computer name is not registered. If you stop this service, your computer will not be able to explain DNS information, log on with a domain name site.
NetworkConnections
The official explanation: management of the "network and dial-up connection" folder objects, where you can view local and remote connections. If you stop this service, you will not be able to configure the network, you cannot create a network link, do not have access to the Internet.
PlugandPlay
The official explanation: enables computers in a very little or no user input can recognize and adapt to hardware changes. Termination or disabling this service will result in system instability.
PrintSpooler
The official explanation: loads files to memory for later printing. Without it you don't want to keep the card, the others are the print service.
RemoteProcedureCall
The official explanation: RPCSS service is a com and DCOM Server Service Control Manager. It performs COM and DCOM object activation requests to the server, the object exporter to resolve and distributed garbage collection. If this service is stopped or disabled, use COM or DCOM program will not work properly. It is strongly recommended that you enable RPCSS service is running. This very crucial point is? the important? snow, prohibit it, your system will not start.
Workstation
The official explanation: use the SMB protocol creates and maintains client network and the connection between a remote server. If this service is stopped, the connection will not be able to use. If this service is disabled, any services that explicitly depend on it will fail to start. As the name implies, to prohibit it, your computer will disappear, network, do not want to use the media to play with Microsoft's Internet resources.
NetworkLocationAwareness
The official explanation: collect and store network configuration information, and this information is modified to that notification. If this service is stopped, the configuration information may not be available? Ah if this service is disabled, display all rely on this service will not start.
This is a wireless network link, but prevent it many problems.
DHCPClient
The official explanation: registration for this computer and to update the IP address. If this service is stopped, the computer will not be able to receive dynamic IP addresses and DNS updates. If this service is disabled, any services that explicitly depend on it will not boot.
Prohibition of the DHCP service, you only have to manually set the IP.
CryptographicServices
The official interpretation of: provide four management service charge on the catalog database service?, confirms Windows file signatures and allow installation of new programs? sea protected root service, is used to add from the computer and remove the trusted root certification authority certificate; automatic root certificates update service, used to retrieve from the WindowsUpdate root certificate and enable SSL?, Arthur secret key is used to assist in registration to obtain a certificate on this computer. If this service is stopped, these management services will not function properly. If this service is disabled, any services that explicitly depend on it will fail to start.
Prohibit the encryption service will result in the computer security index declined, doesn't automatically update, you cannot use SSL.
Monday, February 14, 2011
【 Weak current College 】 solve challenges in WinRAR edit
The Cabinet is locked challenges
When we edit the WinRAR program window, ready to save paper when you exit, the system may prompt window will pop up, tell us the current edited WinRAR compressed package is locked, has been the edited files may not be saved in the compresses the package file (as shown in Figure 1). When we accidentally encountered such a problem, how can we effectively resolve?
We encounter the compressed package file is locked, is currently being edited in the compresses the package file has been enabled to prevent modification of compressed files, so have the edited file is not saved in the compresses the package file.
Experience this problem when the phenomenon, we can first be already edited Cabinet at the specified file name to save the change, to prevent their own hard work wasted;
Then in WinRAR program window, select the one you just edit the destination file, and press the keyboard's "Alt + L" compound key, the subsequent pop-up option settings window, check the "prevent modification of compressed files" item is selected, if you find that the option has been selected, we just set its selected State to cancel out, and then click "OK" button to return to the WinRAR program window;
Then click the program window of the "add" button to eject the file selection dialog box, set the previous change name saved files back in, then the compressed package of original file deleted, we will not only effectively saved already edited the file, but does not appear the next time you also cannot modify locked file problem.
Solve the unable to save file problem
When we in the WinRAR program window directly edit a file, in the editing process if you are not careful and open another compressed package file WinRAR program will we currently editing in the compresses the package file is automatically closed off, then is in the editing status of the target file will face challenges cannot be saved.
When you accidentally encountered such a problem, we might as well be resolved as follows:
First of all in WinRAR program window, click menu bar in the "options" item from the drop-down menu that pops up executed "set" command to open the compression settings window program parameters;
Then click the settings window of the "General" tab, open as shown in Figure 2, the label page to check the "reuse of already existing window" option is selected, if you find that the project has been selected, we must immediately set its selected State to cancel out, and then click "OK" button to end the WinRAR program option sets the task. So, when we next time you edit a file, even if you accidentally open another compressed package file, currently being edited in the compresses the package file will not be automatically turned off, then a file being edited can be saved correctly.
Tip: by default, if we WinRAR compressed package file to be edited directly by editing the file often will be automatically saved to the "X:\DocumentsandSettings\aaa\LocalSettings\Temp" following a temporary folder (where "X" as the Windows system is on a disk partition symbols, "aaa" to log on to the computer system of the current user account name), but as long as you are editing a compressed package is turned off, then the temporary files being edited are also automatically deleted from the system.
Weak current College】 【settings for WinRAR to extract the files to the target --- Power By】 【China power house network.
Downloading many files from RAR format is a compressed package file, many newbie friends like WinRAR program window by double-clicking it in the target file to be unzipped, but around search can't find file to extract it.
In fact, when we double-click to unzip the file, the destination files tend to be automatically released to the "C:DocumentsandSettingsuserMyDocuments" folder (including the Windows system user that logs on to the current user account), as long as access to the folder you will find a file from a compressed package of documents released. But due to open the above folder is too much trouble, it is not convenient to quickly find unzip the documentation, so we can customize a fast direct access to the path of the release, in order to enhance the efficiency of the search for the file, the following is a custom release specific steps of the path:
First open "my computer" window, enter the system partition other than the disk partition window, and then in the root directory of the following to create a partition to store a variety of extracting document folder, for example, our E-up following created a "extract files" folder;
Second run WinRAR program and its interface, click menu bar in the "options"/"settings" command, then the pop-up settings window, click "compression" label, open as shown in Figure 1, page of labels.
Figure 1WinRAR compression option settings
In the pages of the "extract files in the default folder" text box, the default of "C:DocumentsandSettingsuserMyDocuments" release deleted path, and then specify the front has a good "E: unzip the file" path to fill in here, then click "OK" button, which we then use the mouse double-click the compressed package file, the file will be automatically released to the "E: unzip the file", then we need to do is direct "E: unzip the file" can find unzip the file "shadows". Of course, here we can also provide the newly created compressed package file specifies a right to save the file, after the new compressed files can automatically be finishing to the specified location.
【 Weak current College 】 doing hard disk protection at the grassroots level---Power By 【 China power house network 】
1. hard disk is reading and writing is not suddenly loses power
Hard disk read and write operations, is in speed rotation (now usually 7200 revolutions per minute or 5400 RPM), if a sudden power failure, may result in severe head and disc friction damage the hard drive. It's best not to sudden shutdown, shutdown is important to note that the hard drive led on the Panel is still blinking, only when the hard drive led stops flashing, the hard disk read-write end before shutdown.
2. pay attention to maintain sanitation
In the damp, dust, powder serious exceeding environment using computer, there will be many more pollutants to adsorbing surface of the printed circuit board and the spindle motor. Humid environment also makes the insulation resistance, and other electronic devices is not stable. Therefore you must keep the environment and health, reduce the degree of moisture in the air and dust. Remember: General computer users will not be able to open the hard drive cover, otherwise the dust in the air into the hard disk, read in the head, write to scratch disc or head. So when a hard drive failure, not to dismantle the hard drive enclosure, and should deliver a professional manufacturer for repair.
3. takes note of the hard disk shock (this is important)
Hard drive is a high-precision equipment, head of the disc surface float height only a few microns. If the hard disk is in a read-write state, in the event of larger vibration may cause head and platters of impact, resulting in damage. So don't move the running computer. In the hard disk installation, demolition process should be more careful, your hard drive when you move, transport, it is best to use strictly prohibited kepeng foam or sponge packaging protection to minimize vibration.
4. takes note of the control environment temperature
When using the hard drive against high temperature, moisture, anti-electromagnetic interference. Hard work will produce some heat, use of thermal problems. Temperature to 20 to 25 ° c is appropriate, the temperature is too high or too low may cause crystal oscillator clock clock speed changes. Temperature also cause malfunctioning hard drive circuit elements, magnetic media will also effect due to thermal expansion and caused log error; temperature too low, the moisture in the air will be condensed in IC components, causing a short circuit. Humidity is too high, the electronic components surface may be a layer of water film adsorbed, oxidation, corrosion circuits, so bad that even short circuit, also makes magnetic magnetic media changes, causing the data read and write errors. Humidity is too low, easy to accumulate large amounts of rotating machines produced by electrostatic charge, these static CMOS circuit will burn, adsorption dust and damage to the head, scratch disk slices. Room humidity for 45 ~ 65% suitable. Note to air dry or regular power on the system, its own heating will evaporate within water vapor. Also, try not to make the hard drive near strong magnetic fields, such as speaker, Horn, electric motor, radio, phone, etc., in order to avoid the hard drive of the recorded data by magnetizing and damage.
5. make use of the hard disk
Root general storage system files and subdirectories to store as little as possible. To always run Windows Disk Defragmenter to defragment the hard drive. Note frequently by deleting "dumpster" and "\WINDOWS\TEMP directory for temporary files.
6. preventing computer viruses on the hard drive destruction
The hard drive of a computer virus attacks, you should be aware of the key objectives with the most up to date anti-virus software to protect against the virus. And attention on important data protection and regular backups.
7. hard drives get method
Hard drive holding you don't bump on, this is just one of the required; another taboo is "static". Climate is dry, extremely easy to generate static, in this case if not carefully hand touching the circuit boardon the back of the hard disk, the "static" is likely to be hurt, components on your hard disk to function properly. Correct posture should be to hand grasp both sides of the hard disk, and avoid its direct contact with the back of the circuit board. In addition, some manufacturers (like Seagate) in its hard disk external package with a layer of protective films, this film with shockproof protection function, the protection to which the circuit board, so users get a hard disk can be fewer scruples.
Second, the hard drive using common fault and repair
A common fault: the system does not recognize the hard drive
System cannot boot from the hard disk, boot from A disk or enter the C disk, use the automatic monitoring of CMOS function cannot find the hard drive. Such failures are mostly appears in the connection cable or an IDE port on the hard disk itself failure is unlikely to re-plug the hard drive cable or change IDE interface and cable, replace the test, you will soon find fault. If the new connected hard disk will not be accepted, a common reason is that the hard disk's master-slave jumper, if an IDE hard drive line 2 hard disk device, it is necessary to distinguish between master-slave relationship.
Common breakdown 2: hard drive cannot read and write or do not identify
Such failures are typically caused by the CMOS setup failure. CMOS in hard disk type are correct or not directly affect the normal use of the hard disk. Now machines support "function, IDEAutoDetect" can automatically detect the type of hard drive. If the hard disk type error, sometimes simply cannot start the system, can sometimes start, but will read and write error occurred. Such as CMOS type hard drive in less than the actual capacity of the hard drive, the drive behind the sector will not be able to read and write, if this is a multiple-partition state the individual partitions will be lost. There is also an important cause of the failure, due to the current IDE support logical argument types, the hard disk can be "Normal, LBA, Large", if in normal mode to install the data, but also in the CMOS to other modes, the event of a hard disk read/write error failure because their mapping relations have changed, and will not be able to read the original correct hard disk location.
Three common fault: the system cannot start
This failure is usually based on the following four reasons:
1. the primary boot loader is damaged
2. the partition table is corrupt
3. the partition is activeBit errors
4.DOS boot file corruption
Among them, the DOS boot file damaged most simple, use a boot disk to boot the system after a boot file. The primary boot partition is corrupted and damaged the effective bit generally can use the FDISK/MBR force overwrite. Partition table corruption is more trouble, because it does not recognize the partition, the system will put the hard disk as a nonpartitioned bare disc handling, thus causing some software will not work. But there is a simple method of using Windows2000. Find a system with Windows2000, damaged hard drive hangs up, turn on after Windows2000 in order to guarantee the stability of the system hardware will be grafted in the new hard drive for scanning. Windows2000-hard drive scanner CHKDSK for for various reasons damaged hard disks are good finished restoration capability to scan and fix hard disk basically.
Partition table is corrupt, there is also a form of EOB "partition mapping", the specific performance is an active partition and partition. The same include file structure, content, capacity. If in any area on the partition content made changes will be reflected in another Office, it seems to be mapped as a shadow. I have come across before, 6.4G hard drive into 8.4G (mapping the 2 g C district). This problem is particularly embarrassing, this issue does not affect the use, repair, or something, but when you want to repair, NORTON DISKDOCTOR and PQMAGIC of all became open eyes blind, with a total capacity of the partition and hard disk does not match the actual size, with no problem in perfunctory you. To tackle this problem, only use NORTON GHOST to overwrite and rescue disk restore partition table.
Four common fault: a hard disk has bad road
This is a shocking that people see people afraid of the word. Recently, IBM reputation because of the decline. When you use system Windows system with a disk scanner to scan hard drive SCANDISK, the system prompts that hard drive may have a bad track, then Flash a terrorist's blue, yellow box slowly spread, then, in a square marked on a "B" on ...
In fact, these bad track mostly logical bad road, can be repaired. Do not carry-in (it is said that manufacturers are development-test tool for repairing hard disk can't stand half simply good this fact "cruel").
Then, when there are such problems, how should we deal with it?
Once you use the "SCANDISK" scans the hard drive if prompted with bad road, first of all we should reuse the brand hard drive their own self test to perform full scan. Note, however, don't choose a quick scan, because it can only detect approximately 90% of the problem. In order for your own peace of mind, in that spend more time is worth it.
If the check result is "successful repair", it can determine is the logical bad road, you can clap chest breath; if not, then no repair may, if your hard drive is still in warranty, then get it to replace it.
Because logical bad track only family marked, in the future, do not use assigned to the file. If this is the logic of bad road, as long as the hard disk is reformatted. But in order to prevent the phenomenon of discarded format can (because the family has made a mark that is the bad clusters, the formatter may not check is accepted the "reality", then drop it), it's best to partition, use the if such software or IBMDM fairly quickly, or GHOST cover can also be, but these two are more or less lose some data.
Five common fault:hard drive capacity and the nominal value does not match the obvious
In General, a hard disk formatted capacity is less than the nominal value, but this gap is never more than 20% if the difference is large, you should enter the BIOS settings when powered on. Where your hard drive for a reasonable setting. If not, then probably your motherboard does not support large capacity hard drive, you can try to download the latest BIOS of motherboard and refreshed. This kind of failure in the high-capacity hard drives and older motherboards and match. In addition, because suddenly loses power, makes confusion BIOS settings can also cause this failure.
Six common failure: unable to boot hard disk bootstrap, the system does not recognize the hard drive
Such failures are often the most was terrible. The failure of the main reasons is the hard disk partition boot sector data is corrupted, performance for hard disk partition or partition label is missing. This failure is often the culprit, it will override the error data to the master boot sector. Some of the common market that anti-virus software provides repair hard drives feature, you may wish to try. But if you have no such tool, you can try the full-0 data is written to the master boot sector, partition and format again, its methods are as follows: use a DOS boot disk clean boot the computer, enter A: > after entering the following command (in parentheses as a comment):
A:\ > DEBUG (go to the Debug programs)
-F1003FF0 (the data area of the content-0)
-A400 (increase following command)
MOVAX,0301
MOVBX,0100
MOVCX,0001
MOVDX,0080
INT13
INT03
-400 G = (perform disk operations command)
-Q (exit DEBUG programs)
Use this method generally makes you hard drive resurrection, but because of the need to repartition and format the data to the warrant. These are the hard drives in the daily use of some common breakdown and solution that will hopefully be inspiring for us. If a hard drivecrash quite serious and cannotWith some of the ways mentioned above, it may well be a mechanical problem. Due to the hard drive of the structure is quite complex, so does not recommend the removal of the user himself, but to turn to the professionals to repair.
Seven common fault: regardless of the device are not normal boot system
This failure is due to the hard drive is generally virus "logical lock" locked, "hard disk logical lock" is a very common means of pranks. In a logical lock, regardless of what device does not boot the system, or even a floppy disk, CD drive, hanging like double drive does not have any effect.
The "logical lock" locking principle: the computer is in boot DOS system will search all logical disk order, when a DOS is the boot-time, first to find the master boot sector of partition table information, and then locate the extended partition, logical drive. The "logical lock" modifies the normal master boot record, you will expand the partition of the first logical disk point to themselves, makes DOS on startup to find the first logical disk, locate the next logical disk always find himself, this formed a dead loop.
To the "logical lock" unlock the easy way is the "hot swap" the hard drive power. That is when the system starts, the first not to be locked in the hard disk is powered on, the startup is completed and then to the hard disk "hot plug" on the power cord, so that the system can control the hard disk. This is a very dangerous way, in order to reduce the risk, meet the "logical lock", all the best in accordance with the following sort of relatively simple and secure way.
1. first prepare a boot disk, and then in the other working machines use binary editing tools (recommended UltraEdit) modify the IO.SYS file on the floppy disk (remember to first before modification of the file attributes to normal), specifically in the file search first "55AA" string to locate later modified for any other number. Use this modified systemfloppy disk you can smoothly with locked hard drive boot. However at this time due to the hard disk partition table has normally been damaged, you cannot use "Fdisk" to delete, and modify partitions, you can use Diskman and other software you can restore or rebuild partition.
2. because the DM is not dependent on the motherboard BIOS to recognize the hard drive hard drive tools, even in the motherboard BIOS to the hard drive is set to "NONE", DM also recognizes the hard disk and partition and format, and so on, so we can also use DM software to unlock your hard disk.
First of all, to copy the DM to a system disk, connect the hard drive after the power on lock, press the "Del" key to enter BIOS Setup, all the IDE interface is set to "NONE" and save the back exit, and then start the system with the floppy disk, the system starts the "locking", because the system is simply equal to no hard drive. Run DM after startup, you will find the DM can recognize the hard drive, select the hard disk partition to format. This method is simple and convenient, but there is a fatal flaw is that the data on your hard disk could not retaining.
【 Weak current College 】 Server overheating causes and solutions
In the ongoing expansion of high density data centre, if a 42U server rack loaded, will inevitably lead to its temperature is too hot, and rack top server often temperature Max. It rack installation how many servers is appropriate? should keep servers much interval?
The problem is that most data centers are facing, because most data center design and cannot cope with such a large number of small server cabinet release heat density. And lead to overheating may have three potential may result:
1. your cooling equipment not meeting the needs of the Cabinet;
2. your refrigeration capacity cannot meet the demand for cooling the room;
3. the above two reasons.
A solution to this problem has only two methods:
1. maintaining your air conditioning equipment or cold devices or appropriate increases its power.
2. If your cooling equipment sufficient to increase the device's interval or reduce server density, thereby reducing each cabinet heat density.
First thing to do is find a way to let the air conditioning system to maximize their effectiveness. If the temperature is not obvious, either because your cooling power is insufficient, or because your equipment design and layout is not reasonable, or cooling equipment efficiency is not high enough. We must ensure that the cable does not obstruct the air conditioning system of underground air flow, should air conditioning system for proper maintenance and ensure its normal operation.
Adjust the server space is not to say that each cabinets are 1U of space. This effect is not evident I'm afraid, unless the lower each cabinet load. Hot air rises, the Federation of air from the floor in the outflow is cool, but when it reaches the top of the Cabinet after the problem is high. In addition, some from the machine back-end "hot channel" hot air will inevitably reach the top of the Cabinet, and then re-enter the high-level servers. As you pointed out, often at the top of the servercabinet is the hottest. Therefore, in General, we from bottom Cabinet "lightening" bottom-up numbers in about 4, 5U location to place a blank plate, with a blank Board will block the space remaining.
The "maintenance interval" means high load between the Cabinet you want to place two or more low load Cabinet. In a traditional data center, we generally recommended that a cabinet position 15 to 20 1U server. Of course this only empirically given recommendations, the real situation depends entirely on each server's energy requirements, as well as equipment for wind power transmission capacity. I suggest you'd better use only half of the Cabinet space to see if it needs to be improved significantly. In addition, you must ensure that the cable does not block the cooling exhaust device server.
If this effect is not good, you need to use all of the above steps to use your air conditioning system for maximum effectiveness, moreover, may also need to increase the cooling capacity of the device. The market has a lot of new solutions, over time the number is still in its growth, but this is a costly and certain destructive tasks. Generally, the experts do not suggest that you only add one CRAC (computer air conditioning equipment). Because this practice very few can really solve the problem, but often can cause some problems. Local air cooling, single-row refrigeration, or since the cold Cabinet and so on these devices require some type of the new configuration, but if you choose, design or use a method correctly, and to acquire large air conditioning equipment compared to their cost is more efficient and more flexible, you can avoid the destruction of data center infrastructure. In addition, now some experts research and development of computer tools, without a significant investment of precisely identify the problems.
【 Weak current College 】 video card performance indicators with those
Basic overview
Full name of the video display card (English: Videocard, Graphicscard), also known as a display adapter (Videoadapter), monitor configuration card known as the video card is the most basic component of a personal computer.
The video is a computer system is needed to convert the displayed information, and to monitor the driver provide line-scan signal, control the monitor's display correctly, is the connection monitor and PC motherboards to important component is the "man-machine dialogue," one of the important equipment. The video card as computer hosts an important part of the commitment of the output display graphics tasks, engaged in professional graphic design for the video card is very important. Civilian video graphics chip vendors, including AMD (ATi) and two Nvidia
Working principle
Once the data (data), leaving the CPU must pass through four steps, finally reach the display screen:
1. from the bus (bus) to the GPU (graphics processor GraphicsProcessingUnit)-will be sent to the data of the CPU to the GPU (graphics processing unit) for processing.
2. from videochipset (graphics chipset) into videoRAM (memory)-the chip the data have been processed and sent to the video memory.
3. from memory into DigitalAnalogConverter (= RAMDAC, random read/write storage mode — number converter), display graphics memory read out the data and then sent to the RAMDAC for data conversion work (digital signal to analog signal).
4. from the DAC to monitor (Monitor)-converts the analog signal to the display.
Show effectiveness is part of the system's effectiveness, their effectiveness of the above four steps may determine that the effectiveness of the display card (videoperformance) not too, if you want to strictly separate, display card of effectiveness should be determined by the middle two step, because the two steps of data transmission are the internal display card. The first step is the CPU (calculator and controller together make up the core of a computer, a microprocessor or CPU, CPU) to display the card inside, the last step is the display card directly to the screen.
Basic structure
1) GPU (similar to Motherboard CPU)
Full name is GraphicProcessingUnit, Chinese translation for "graphics processor". NVIDIA GeForce256 publishing company in graphic processing chip first initiated the concept. GPU makes video reduces dependence on the CPU, and make part of the original CPU work, especially when in 3D graphics. The GPU core technology with hardware T & L (geometric transformation and lighting treatment), cubic environment texture and vertex blending, texture compression and a bump map texture, dual texture four pixels, 256-bit render engine and hardware T & L technology can be said to be the sign of the GPU. GPU production mainly by nVidia and ATI both production companies.
2) memory (similar to the motherboard memory)
Displays a short memory. As the name suggests, its main function is to temporarily store display chip to process data and data processing is complete. Graphics core, the stronger the performance, you need graphics memory. Previous video memory of mainly SDR, capacity is not large. Most of the video card market is GDDR3 graphics memory, now the latest graphics the performance even more excellent GDDR5 graphics memory GDDR4 or. Graphics memory is mainly composed of traditional memory manufacturers such as Samsung, Hyundai, Kingston, etc.
3) video card bios (similar to the motherboard's BIOS)
Video card BIOS is used primarily to store display chip and control procedures between drivers and also has a display card models, specifications and manufacturer information, such as the time of manufacture. Open the computer, the BIOS through the display section of the program, will these information back to the screen. Early shows the BIOS is curable in ROM, can be modified, but most of the displaycard has adopted the bulk of the EPROM, the so-called FlashBIOS, accessible through a dedicated program to overwrite or upgrade.
4) video PCB (similar to a Board PCB)
Is the graphics board, it put the video of the other part. Function similar to the motherboard.
The main parameters
1. display chip (model number, revision levels, develop code, manufacturing process, the core frequency)
2. the memory (types, bandwidth, capacity, package types, speed, frequency)
3. technology (pixel rendering pipeline, the vertex shader engine number, 3DAPI, RAMDAC frequency and support MAX resolution)
4.PCB Board (PCB layers, graphics interface, output interface, the heatsink)
1) display chip
Display chip:
Also known as the figure type processor-GPU, it's role in the video, as CPU in the role of the computer. More direct analogy is the brain in the role of the human body.
First briefly common production display chip vendor: Intel, ATI, nVidia, VIA (S3), SIS, Matrox, 3DLabs.
Intel, VIA (S3), SIS produces integrated chip;
ATI and nVidia to independent chip, the mainstream of the market.
BR > Matrox, 3DLabs is primarily intended for professional graphics market.
Because of the ATI and nVidia video card basic occupy the mainstream market, the following main will focus on the two companies ' products.
Model:
ATi Radeon company's primary brands (leilong) series, its model from its of 7000/7200/7500/8500/9000/9200/9550/9600/9700/9800/X300/X600/X700/X800/X1300/X1600/X1800/X1900/X1950/HD2400/HD2600/HD2900) to recent
Radeon(HD3400/HD3600/HD3800/HD4350/HD4550/HD4600/HD4650/HD4670/HD4770/HD4800/HD4850X2/HD4890/HD4870X2/HD5750/HD5770/HD5850/HD5870)。
NVIDIA GeForce company's main brands (fine vision) series, its model from the GeForce256, GeForce2 (100/200/400), GeForce3 (200/500), GeForce4 (420/440/460/4200/4000/4400/4600/4800) GeForceFX (5200/5500/5600/5700/5800/5900/5950), GeForce (6150/6100/6200/6500/6400/6600/6800/), GeForce (8400/8500/8600/8700/8800)
Further to recent GeForc (9400GT/9500GT/9600GSO/9600GT/9800GT/9800GTX +/9800GX2/GTX260/GTX260 +/GTX280/GTX275/GTX285/GTX295).
Version level:
In addition to the standard version, but also some special edition, Special Edition will normally be in the standard version of the model followed by a suffix, common are:
ATi:
SE (SimplifyEdition Lite) is usually only 64bit memory interface, or a reduction in the number of pixel line.
Pro (ProfessionalEdition Professional Edition)-frequency version, General version than the standard number in the line number and frequency/points those aspects have to be slightly higher.
XT (eXTreme high-end Edition) is a series of high-end ATi, and nVIDIA for low-end models.
XTPE (eXTremePremiumEditionXT Platinum Edition) high-end models.
XL (eXtremeLimited high-end series of lower-end models) ATI's newest version of high frequency R430
XTX (XTeXtreme high-end version) published after X1000 series new naming rules.
CE (CrossfireEdition CrossFire Edition) crossfire.
VIVO (VIDEOINandVIDEOOUT) means a graphics card with video input and video capture two functions.
HM (HyperMemory) could take up memory video card
nVIDIA:
Based on the XT ZT again block to lower prices.
XT block version, while in most high-end ATi said.
LE (LowerEdition low-end version) and XT Basic, ATi is also used.
SE and LE similar basic is a simplified version of GS at the low end of several models
Version MX parity, public class.
GS-Standard Edition or a simplified version of the GT.
GE also is a simplified version but a little bit stronger than GS, yingchi video card is used to indicate the ashes player Edition "stuff
GT common game chips. Grade than GS, since higher a GT no reduction pipeline and vertex element.
GTS range of GT and GTX version between GT's enhanced Edition
GTX (GTeXtreme) represents the most powerful version of the streamlined as GT
Ultra in GF8 series represents the most high-end before, but the 9 Series top-end GTX named it replaced.
GT2eXtreme Dual GPU graphics card.
TI (Titanium and titanium) previous usage in General is the representative of the nVidia's high-end versions.
Go for mobile platforms.
TC (TurboCache) can take up memory video card
GX2 (GTeXtreme2) refers to two video cards in SLI and group consolidation as a video card that is different from SLI is only one interface. If 9800GX27950GX2
Since then, G100 series NVIDIA renamed the video version, so the suffix product lines more neatly
GTX video card performance level of high-end/GTX295GTX275GTX285GTX280GTX260
BR > GT represents mainstream product line GT120GT130GT140GTS250 (9500GT9600GT9800GT9800GTX +)
G low-end entry point G100G110 (9300GS9400GT)
Subscribe to:
Comments (Atom)