Monday, April 25, 2011
Weak current College】 【solve Word table paste dislocation problem.
<br> <br> Word processing personal resume form, you often want to encounter a certain row of the table into another table. Looks very simple question, but will often unexpected results, Äî even if the two tables is identical to the number of .columns, paste the results often "dislocation" and paste into the line always does and its adjacent rows aligned. <br> <br> 1. plan ahead, prior preparation <br> To resolve this problem, the first approach is to improve the .row into the target table. First display all formatting marks. Select the menu "Tools, Üí Options", select "view" tab, select the "format tags" below the "all". When finished click the "OK". In the .target table of an empty row is added at the end, be careful not to enter in this row. In the source table, select the rows you want to copy the cells, but do not select the row at the end of the closing tag. .Then copy the contents of the selected after pasting in the target table, when necessary, Word automatically inserts the new row, the newly inserted row is always fully with existing rows. <br> <br> But this approach is not applicable at all times ., Äî if we want to paste the contents into the incoming destination table in another location (not final), the target table in the original content may be overwritten unless before pasting, we first of all in the target table insert enough blank lines, but .that seems to have too much trouble. <br> <br> 2. it is never too late to remedy <br> We look at the wrong form of remedial measures. First of all, we can use a Word table "Auto adjust" .function. <br> Select the entire curriculum vitae of misalignment, select the menu "table, Üí automatic adjustment, Üí automatically fit the contents table". Everyone for some complex tables, particularly the presence of a nested table, this approach is not necessarily .effective. You can use the "table, Üí text, Üí table" conversion method. Select the entire table, will misplace the entire table to text. Select the menu "table, Üí transform, Üí convert table to text", a dialog box .appears. Choose a table does not appear in the character as a separator, click on "OK". Then convert text to table, select the menu "table, Üí transform, Üí convert text to table", a conversion dialog box, select the .delimiter used earlier, and then click OK. <br> <br> 3. big profit, click mouse <br> If you often have to deal with wrong form, the most convenient way is to create a simple macro. Find by macro AutoFitAllTables .Word document all of the table, for each table, call its individual columns AutoFit method, Äî automatically adjust its width, the ultimate effect is to align all of the rows and columns. <br> SubAutoFitAllTables () <br> DimoTblAsTable <br> .ForEachoTblInActiveDocument.Tables <br> oTbl.C <br> olumns.AutoFit <br> NextoTbl <br> EndSub <br> Open the Word macro VisualBasic Editor, enter the above macro, and save. Select the Word menu "Tools, Üí Customizing .", go to" commands "tab, drag the macro AutoFitAllTables Word appropriate location on the toolbar, Word automatically adds the button to AutoFitAllTables naming. Right-click the button, the button named" align all columns ", and finally close the figure four .custom dialog box. Then, simply click on the "align all columns" button, Word automatically align all the wrong form, very convenient! <br> <br> <br> <br> <br> <br> <br>.
【 Weak current College 】 slowing down the operating system to start the real cause of several
We all hope that the computer can boot into the Windows system immediately without waiting for, but for various reasons often failed to do so, or even a post on panic situation occurred from time to time. In fact, there are times when Windows startup is slow and not its own issues, but some equipment or software, see the following slow system starts eight reasons, then find out your computer is not a similar problems!
1.USB devices such as hard drives and scanners
If you installed the scanner, and other computer equipment, or in the startup has been connected to a USB hard disk, try going to disconnect them, look at the startup speed is not the change. In General, because the USB interface is slow, therefore the corresponding devices will have on the computer to start faster, more obvious should start after you connect a USB device. If you do not have a USB device, it is recommended that directly in BIOS setup the USB feature is turned off.
Tip: because Windows startup for all drives (including CD-ROM) for testing, so if you put the disc in the optical drive, you will extend the computer's startup time.
2. make the irritating adapter
If set properly, the network card has a significant impact on system startup speed, if your computer don't have the network card, then unplug the network adapter directly so as not to affect the system boot speed.
If your PC is connected in the LAN, install the network card driver, the default system automatically through DHCP to obtain IP addresses, but most corporate local area network and does not have a DHCP server, so if the user is set to "obtain an IP address automatically", the system starts, it will continually search the network for DHCP
Server until the obtain an IP address or a timeout, naturally affects startup time, LAN users the best for their own computer to specify a fixed IP address.
3. total memory ' card ' system
Games run comparison covers memory will also slow down the system, like Maxthon browser comparison also accounts for the memory, the anti-virus software will compare the total memory. Many users after installing anti-virus software is reflected, system up time machine is slow, the operation is delayed. Like some must have programs that we can't, but like browser and anti-virus software this optional won't be the same. We can select TT browser it will react more quickly. Antivirus software we can select drug tyrants jisuban, jisuban super small memory footprint, only 15MB *, jisuban ultra low CPU/IO footprint, not the "card" System. But there is a power saving design.
System, there are a lot of spam, maybe you don't care, do not see. But the system garbage if combined, accounted for much memory or be aware Oh!! we can use the Jinshan cleanup specialist assistive software to clean up, clean up the results better, manual delete incomplete.
4. disconnect the unused network drive
In order to eliminate or reduce Windows must re-establish the number of network connections, it is recommended that some do not need to use a network drive is disconnected, or enter the "my computer", right-click has established a mapped network drive, select "disconnect".
5. hard disk partitions too many are wrong
If you do not have to upgrade to SP3 Windows2000 or SP4, and defines the too many partitions, you can also make starts to become very long, even hang. Therefore it is recommended to upgrade to the latest SP4, at the same time it is best not to drive too many areas. Because Windows must be loaded at boot time for each partition, with the partition number of increase, this will be the total amount of time.
6. desktop icon is too much trouble
There are too many icons on your desktop would also be a drain on system startup speed. Each time you start Windows and show the desktop, you will need one by one to find the desktop icon for the shortcut and add them to the icon, the more time spent in the course. Suggest that you will not be common desktop icons into a special folder or simply deleted!
Tip: some antivirus software provides a system starts scanning feature, it will consume a lot of time, in fact, if you have already opened the antivirus real-time monitoring capabilities, then start scanning system would seem a bit redundant, or will this feature prevents!
7. font too many detractors also
While Microsoft claimed that Windows can install 1000 ~ 1500 font, but in practice we find the font when the installation of more than 500
New problems arise when, for example: font from the font list of the application and Windows in the disappearance of a significant decline in startup speed. In this proposal it is best to use less or not frequently used fonts dropped, to avoid deleting after an accident, to make the necessary backups.
8. Microsoft's own "internal"
Remember a patch causes WindowsXP start slow news bar (for example: code-named Q328310 patches will cause Windows2000/XP startup and shutdown speed slow, even potentially cause registry lock), Microsoft's own internal problems with the possibility of also, if you upgrade a system patch, suddenly found the system to start slow, then it is best to pay attention to is not the fault of the patch.
【 Weak current College 】 barricade and brand machine difference
Briefly talk about the brand and its own Assembly computer differences. emphasize that currently all brand machines are installed, but the Group brand machines are assembling large bulk procurement, India after tested his own brand, and then use its own sales network for sales-this is me speaking in front of the CPU, memory, hard drive, video card, particles of the GPU are manufactured abroad.
1. stability: brand machine parts used bulk purchases, has its own separate assembly shop and test workshop, with its own brand concept. barricade themselves without good packaging environment and test environments, prone to compatibility issues.
2. flexibility: brand machine configuration under normal circumstances you cannot change or choose a small, but room for individual Assembly machine can according to their own needs and economic conditions to be configured.
3. price: brand machine price is higher than the same configuration set machine prices high, because the brand value in it, as well as after-sales service, facade, and so on, the more the big brand brand computer more profitable, for example: 5000 element computer manufacturers of brand is about assembling costs $ 400, $ 1000 remaining is the brand value, invoices, customer service, dealer profits, and so on, of course we can with time, but can't get 4000 Yuan will not exceed 4200 Yuan, because they are large bulk procurement, price advantage, but the group installed price does not include the invoice price, tax is 4%, whereas the selling price of brand machine contains the invoice.
4. after-sales service: brand machine after-sales service is generally 3 years mainly hardware, software, 1-year free warranty, and barricade after-sales service typically software 3 months free service, of course, appropriate super little time is no problem, hardware warranty according to your choice of hardware brand to determine warranty time, such as: CPU 3 years warranty and 1 year warranty, buy 3 years was 3 years warranty, buy 1 year is 1 year warranty, wear products General warranty 3 months bought brand machine. is to buy a service, buy a barricade is affordable, brand machines for the object is a company and fully understand the computer groups, and barricade is for a little computer knowledge, but also want to buy affordable crowd.
5. Annex: brand machines are generally shipped with genuine antivirus software, Edition operating system (Edition operating system price increases in the computer), what online learning cards and so on, but you do not have these brand machine fittings-General Assembly machine send mouse pad, dust cover, drain plug and so on.
6. the terms of the speed of after-sales service: General brand machine after-sales service for 1-2 business day on-site service, and barricade after-sales service speed depends on your choice of distribution business scale and ensure the General cases faster than brand machine on-site speed.
7. use: If you purchase a brand machines are shipped with the operating system, this edition of the operating system of price increases in the price of brand computer sales, now brand machines generally are not shipped with genuine operating system, the price is too high, it is necessary to know genuine WINXP Professional Edition operating system is the price of around $ 2000, and barricade, currently installed are pirated WINXP OS, use the above does not distinguish between
8. publicity: brand machine General to an outstanding accessories do stunts, develop their own some of the features that are a few fixed groups, no real purpose and fuzzy outline. some of the more important parameter.
9. appearance: brand machine looks more beautiful, brand machine is mainly appearance with coordination to attract the consumer's eye, some brands of machines with small form factor to reduce the size of the host, so detrimental to the host with the heat, no problem for a short time, long time appears the heat problem.
Summary:
Brand-specific object is the Office, enterprises and institutions, on the price is not too sensitive to invoice, performance is not too high,
Purchase brand main prized brand machine stability, quality and service, ancillary Edition operating systems are generally the cheapest prices of the same type, for example XP operating system is divided into professional and Home Edition, Home Edition's price cheaper than the Professional Edition, and bulk purchasing, so the operating system's price will not exceed 800 Yuan, but the price has been added to the selling price of brand machine. While in ordinary home user will select a pirated XP Professional operating system, usually the CD price is 3-10 Yuan, with genuine use no longer distinguish. after-sales service, the vast majority of brands now machine already without this Edition operating system, the purchase of sales Association help customers install pirated OS and software-be sure to choose a well-known brand of computer, after-sales service network in more advanced, the was bought by the sale, if local only sales not aftermarket or post-sales inconvenient, it loses its significance of purchase brand machine.
Assembly machine for the object is a normal home user,
The main choice of low-cost, easy to assemble and upgrade at will, according to the choice of accessories and bad quality and Assembly personnel level to determine the stability of the computer, it is recommended that users purchase barricade'd accompanied with knowledgeable personnel selection and purchase parts, when you determine a computer's configuration, take a stroll over the configuration of single, individual businessmen, respectively, to give you a quotation, depending merchants ultimately determine which size businesses for distributing machine. machine process to prevent businesses without transshipment, new old generation, can carry several test software, face-to-face tests, generally tested software test 1 hour or more no fault can be assured of home-home of the first 7 days are free exchanges, the computer does not shut down for 24 hours, without Internet access by running your own familiar big games or other software long test, in a few days time of trouble-free operation, basically you can rest assured that your hardware is not a problem.
Weak current College】 【interpretation of distributed firewall - products (2).
<br> These enterprises need a provides the following security security system: <br> · Extended to the network edge, comprehensive security, LAN topology changes or connection originate. <br> · Is independent of the host operating system and will enhance existing security .treatment of tamper-proof security. <br> · Security of shared servers, mobile notebook and remote desktop access, in particular through the fragile broadband connection. <br> · Manageable security implementation that allows the user policy instead of physical infrastructure to account security .. <br> 3Com embedded firewall treatment programmes can meet all these requirements, in the network and provides secure, reliable connectivity. Policy server software and supported firewall connection hardware of this unique combination including 3Com embedded firewall policy server, 3Com firewall PCI cards (for .desktop computers) and 3Com firewall PC card (for notebook computers). <br> (3) protect mobile users <br> 3Com embedded firewall processing options the use of advanced defence, accessible from the server to the edge of the network, regardless of .topology changes or where the user is located. IT security managers can mobile laptop users and work at home with more confidence for remote workers. Centrally managed policies coupled with hardware-based enforcement helps prevent disable or bypass network security. <br> The safe disposal .programmes using PC card type firewall products to mobile users to leave the Office to provide shadow Defender, regardless of where they go, they can defend their LAN connection. Each firewall card can detect user from LAN physical surrounding internal or external connection, and for the .location using the appropriate security policy. Distributed firewall can control each endpoint access to networks, thereby reducing the detour traffic or manage the access control list of cumbersome task. (4) for centralized management <br> 3Com embedded firewall policy server explains security policies, .and cross-subnet, extranets and the Internet to their distribution to 3Com firewall card. It is able to configure the policy to control network access and prevent data sniffing and spoofing, simplify packet filtering and verification tasks, and high-speed response detected attacks. .<br> Centrally managed policy prevents endpoints modify security implementation. IT administrators can be confident when they deploy the appropriate security policy, each user and the system will be defended, and has been the case. You can easily add or delete user and system to .adapt to changing security requirements. <br> As IT administrators save time of remote management, improved security and access control. <br> (5) intrusion prevention <br> 3Com Corporation of this set of embedded firewall system throughout the enterprise to deploy 3Com .embedded firewall processing programme, to enhance its illegal intrusion resistance to help protect network assets. It's an intrusion detection system (IDS) to identify improper or questionable behavior, but does not prevent these acts from occurring. They are also easily gives incorrect alarm, so .IT staff need to identify each alert, to determine whether or not we can do is attack. Generally, after several false alarm, the alarm will be closed. <br> <br> 3Com embedded firewall processing programmes through first intruder refusal to LAN, .can help IDS and other monitoring based on ID's work more efficiently. Once you perform the configuration, the Firewall tab, you can minimize administrative or user intervention to transparently intercept intrusion attempts. It is to defend the use of "always open" DSL connection or .at home using cable modem for remote workers is the ideal treatment plan, because the majority of residents access to the Internet may not have security or without filtering. <br> (6) a cost-effective, scalable <br> Security implementation for each .terminal systems provide shadow Defender, and not a router or traffic. This can make IT in the most need Explorer sites easily with security essentials, such as DMZ subnet, Web hosting server, customer information and liaison officers or temporary employees. Also, security also .be affordable increments to defend an expanding group of users. <br> To ensure that existing infrastructure integration, 3Com embedded firewall processing programme components and global IEEE compatible high-speed Ethernet standards. Furthermore, they can use new features and new skills to perform the .upgrade in order to meet the emerging needs of the business. Firewall has the firmware upgrade capability, so that enterprises in the required time and location needed to build their desired configuration, and can easily expand to meet their development needs. <br> (7 .) processing offload <br> 3Com security firewall card will perform a task to a built-in processor, allowing the host system to deal specifically with the user and use task. No need to sacrifice performance for the price to get security. IPSec and policy .processing is offloaded to hardware firewall, so the host CPU to spare more cycles to process user use and transport. Uninstall also enables 3Com firewall card data throughput than 3DES SonicWALL or WatchGuard firewall equipment increased from 4 to 5 times. However, to keep an eye .on the uninstall feature to Windowsxp or 2000 operating system. <br> (8) super connected <br> Each 3Com embedded firewall policy server supports up to 1000 firewall feature of the system; a domain can be combined with three policy server support 3000 Firewall .feature of the system. <br> 3, PCI and PC card embedded firewall product key features and benefits <br> 3Com to distributed firewall skills embedded in the card devices, software and hardware of the organic integration greatly improves application performance of the device, .this is it is the difference between other software distributed firewall main locations. The following table 3 and table 4 summarizes both the host firewall product features and benefits. Table 3PCI tabbed host firewall main features and prioritiesPoint function benefits security 3Com embedded firewall firewall card will secure .real embedded in the local area network edge against intrusions, tampering and corruption to defend. <br> Hardware-based security in operating systems and transparency to ensure that the end user security system special tamper or damaging. Standards-based supplementary treatment plan to enhance .traditional security treatment programmes, including perimeter firewall, network monitors, DMZ subnet and antivirus programs. Performance Board security processor # and Windowsxp and 2000 operating systems combined with uninstall TCP / IP host CPU, IPSec and firewall capabilities, you can deliver an optimal system performance .. 10/100 auto-negotiation Adaptive-duplex link provides security and high speed Ethernet throughput capacity. Advanced bus skills to rationalize the data transfer, simplified processing tasks, speed up the system and use that response times. Reliability and services including a three- .year limited warranty and Web-based support, unlimited skills (including 3ComKnowledgebaseweb services); extended service contract. Managing 3Com embedded firewall policy server # (sold separately) without user intervention, you can configure and execute global security policy; and helps reduce support costs .. <br> Remote wake-up allows IT administrators to wake up from a central console and management of sleep state of desktop and server. <br> You can perform the firmware upgrade platform 3Com firewall PCI cards can perform firmware upgrade to maximize the flexibility .of a security hardware. Table 4PC tabbed host firewall main features and benefits functional advantages security 3Com embedded firewall processing scheme application embedded in the PC card hardware in tamper-proof firewall security policy, in accordance with the valid IP connection filtering. Hardware-based security .on your operating system and use transparency to ensure that the security system special tamper or damaging. Remote features according to user-initiated is local or remote connection that is automatically assigned the appropriate security policy. Performance 10/100 auto-negotiation Adaptive-duplex link .provides security and high speed Ethernet throughput capacity. Security processors from the host CPU to uninstall TCP / IP, IP checksum and IPSec encryption process to maximize the availability of the platform and network throughput. PatentedParallelTasking and ParallelTaskingII performance provides increased network throughput rates, lower CPU .consumption and faster use of program performance. Managing 3Com embedded firewall policy server * (sold separately) without user intervention, you can configure and execute global security policies to increase security; and helps reduce support costs. IT staff can make 3ComMobileConnectionManager build and send to .mobile employees mobile configuration files; they only need to click the mouse travel. SNMP management, DMI2.0 support industry standards and simplifies network management. <br>.
College】 【weak benefit you for life the use of the 10 word tips.
<br> 1. In fact, the role of Shift + F5 Word is targeted to the location of the last three editors, which will record a Word document the location of the last three edit text, you can press the Shift + F5 key, and edit the location of the three .between the circulation, of course, click Shift + F5 will navigate to the location of the last edit was. .<BR> <BR> 2. .Quickly insert the current date or time <BR> <BR> sometimes finished article, feel the need to insert at the end of the article the current system date or time, most people are achieved by selecting the menu. .In fact, we can press Alt + Shift + D key to insert the system date, and press Alt + Shift + T key combination will insert the current date, and soon! .<BR> <BR> 3. .Fast repeated use Format Painter <BR> <BR> Word provides a quick method of multiple copies of the format: double-click Format Painter, you can copy the selected formatting to multiple locations, click Format Painter again or press Esc key .to close the Format Painter. .<BR> <BR> 4. .Quick Print multi-page table heading <BR> <BR> subject line of the table selected, choose "Table" menu "title line repeated" check box, when you preview or print the file, you will find each .table has a title page, of course, use this technique on the premise that the form must be collated. .<BR> <BR> 5. .Quickly promoted to the title text <BR> <BR> cursor to the first title to be promoted to the text, when you press Alt + Shift + ← key, you can upgrade the text title, and style to Heading 1, then continuously press the Alt + .Shift + → key, can be reduced Heading 1 Heading 2, Heading 3 ... ... Title 9. .<BR> <BR> 6. .Quickly change the text font size font size <BR> <BR> Word drop-down menu to the beginning of the Chinese font number for the number 8 English font for 5 pounds to 72 pounds, which the general office for staff, the course has been more than sufficient. .However, in some special cases, such as printing posters or agencies often use promotional poster to the larger font, the operation to some trouble. .In fact, we totally can quickly change the font size of text: First select the relevant characters in Word, then right click the font size on the toolbar click the drop-down list box, type the value directly, you can quickly change your font size. .And the skills in Excel and WPS2000/Office the same applies. .<BR> <BR> Tip: In fact, there are two Xiaobian fast way to change Word text size: <BR> <BR> (1) select the text, press Ctrl + Shift +> key to .10 pounds is a rapid increase of the selected text font size, and press Ctrl + Shift + <BR> <BR> (2) select the text, press Ctrl +] keys to increase by pounds selected text, press Ctrl + [key .pounds by reducing the selected text. .<BR> <BR> 7. .Quickly set up the first down mark <BR> <BR> need to cook mark selected text, then press the key combination Ctrl + Shift + = can be set to superscript text, and then again goes back to its original state; press Ctrl + = to .Under the text set to standard, then once back to the original state. .<BR> <BR> 8. .Fast cancel the automatic number <BR> <BR> Although Word automatic numbering feature in stronger, but the trial according to the author, found that automatic numbering command often appears confused phenomenon. .In fact, we can use the following method to quickly cancel the automatic numbering. .<BR> <BR> (1) when Word automatically added to their number, you just press Ctrl + Z key to go back on operations, automatic number will disappear at this time, and type the number again, the feature will be banned .; <BR> <BR> (2) Select "Tools" → "AutoCorrect Options" command, open the "AutoCorrect" dialog box, click the "AutoFormat As You Type" tab, then deselect ."Automatic numbered lists" check box (Figure 1), and finally click "OK" button to complete you can; <BR> <BR> 9. .Quick Select the font <BR> <BR> quickly select the font in order to achieve the purpose, we can place frequently used form of the font to the button on the toolbar. .First, right-click the Word toolbar, select "Customize" command, open the "Customize" dialog box, in the "Customize" dialog box, select the "order" tab and move the cursor bar to the category column of the "font" .items, see I usually use the font, drag it into the toolbar button, later to quickly select the font, as long as the first selected text, then press the Font button on the toolbar, eliminating the need from the font drop-down list .box, select the font of many troubles. .<BR> <BR> 10. .Quick removal of Word header removal under the dash <BR> <BR> Quick Word to which the horizontal line under the header can use the following four ways: First, horizontal color can be set to "white"; the second is .When entering the header and footer, set the tables and border to "none"; third method is to enter the header editing, and then select the paragraph mark and delete it; The last method is the "style" icon bar inside ."header" into the "body" on the line. .<BR> <BR> <BR> <BR> <BR>.
【 Weak current college 】 computer failure judgment (3)
The disk class failure
First, define an example
This means the disk class fault indicates that the two aspects: one is the hard drive, optical drives, floppy drives and media and other causes of failure; another is the impact on hard drives, optical drives, floppy disk drive access parts (such as motherboards, memory, etc.) caused by the fault.
Second, the possible failure phenomenon
1, hard disk drives
1) hard drive with the exception of sound, noise is large;
2) BIOS does not correctly recognize the hard drive, the hard drive light is constantly lit or unlit, hard work interfere with other drives, etc.
3) cannot partition or format, hard drive size is not correct, the hard disk has bad road, data loss, etc.;
4) logical drive letter missing or changed, and access to the hard drive times wrong;
5) protection of data on the hard drive fails;
6) third party software hard disk failures;
7) hard drive causing fault protection card.
2, floppy disk drive
1) floppy drive led is not lit, or permanent, floppy read-up sounds great;
Division 2) floppy disk, a floppy disk, you cannot eject or insert, etc.;
3) floppy disk cannot be formatted, floppy disk, a floppy drive cannot read the interference of other drives or devices or applications to work properly, etc.
4) on a floppy disk in the write file cannot read another floppy disk;
5) floppy drive letter missing or changed, to access the floppy drive times wrong;
6) floppy drive installation not in place.
3, disc drive
1) drive noise zoning larger, CD-ROM, disk, CD or DVD drive tray cannot eject or close the optical drive read disc capacity, poor, etc.;
2) drive letter of the lost or changed, the system does not detect DVD drive, etc.;
3) to access the CD drive when panic or an error, etc.;
4) CD media causing the optical drive is not working properly.
Third, the part may be involved
Hard drives, optical drives, floppy drives and their settings, disk interface on the motherboard, power supply, signal lines.
IV. judgments points/order
1. preparation before maintenance
1) disk data cable;
2) corresponding disk detection software;
3) virus checking software.
2. hard drives
1) environment check
A. check the hard drive:
A) hard disk ID jumper is correct, it should be connected to the cable position matches;
B) connection data drive line is connected or connected backwards;
C) hard drive connector if it is damaged or the hard creases. You can replace the connector checks;
D) hard drive connector type hard disk specifications requirements;
E) hard drive power is connected properly, there should not be too loose or not plugged into place.
B. drive Visual inspection:
A) hard drive circuit board components for deformation, discoloration, and fracture defect phenomenon;
B) hard drive power socket of the connected PIN is soldered or removal of welding phenomena;
C) is powered, hard drive post led is not illuminated or permanent; work led is properly glisten;
D) powered, listen to the hard drive operates the sound correctly, there should not be abnormal noise and the noise is too large.
C. check the power supply of the hard disk:
Whether a) supply voltage in the allowable range, fluctuation range is within the allowed range.
2) fault points
A. We recommend software minimum system under examination and to determine whether the symptoms disappear. By doing so you can exclude other drives or part of the hard disk access.
B. parameter and sets the check:
A) hard disk can be recognized properly, the system recognizes the hard disk parameters are correct; the BIOS on the IDE channel of transmission mode settings are correct (it is set to "auto");
B) display of hard disk capacity and actual formatted capacity is consistent with, and the actual match (note, nominal capacity is 1000 units of the callout, and BIOS and formatted capacity is displayed by 1024, between 3% to 5% of the gap. Other formatted capacity is generally less than the capacity is displayed in the BIOS). Hard disk capacity as system capabilities (such as with a key recovery), than the actual capacity of small, smaller values please see user manual instructions;
C) check the technical specifications of the current Board is supported by the technical specifications with a hard disk, such as a hard drive larger than 8GB support, on a high transmission rate of support, etc.;
C. hard drive logical structure check: reference start class failure judgment points in the relevant part.
A) check the partitions on the disks is healthy, the partition is active, whether to format, system file exists or complete;
B) will not be able to partition and format operation hard drive, in the absence of viruses, you should replace the hard drive. Replacement is still invalid, should check software minimum system hardware part is defective;
C) necessary to repair or initialization, or completely reinstall the operating system;
D. system environment and settings: refer to start class failure judgment points in the relevant part.
A) took note of the inspection system for viruses, especially a boot-virus (such as check KV3000/K command, or use MEM.EXE command, check);
B) check the operating system has no third-party disk management software running; Device Manager on the IDE channel settings are appropriate;
C) is opened not appropriate services. Here, the ATA drivers in some applications might be an exception, it is recommended that you uninstall it if after viewing the anomaly disappears;
E. hard disk performance checking:
A) when powered on, if the hard disk sounds abnormal, not working or not working properly, you should check if the power supply has askedProblem, the cable is faulty, BIOS settings are correct, and then consider the hard disk itself is faulty;
B) should use the appropriate hard drive manufacturers of hard disk utility to check the hard disk corruption or other possible fault;
F. for on the hard disk protection issues arising from the card, you should consider the following aspects:
A) installed hard disk protection card, you should be aware of the CMOS for virus warning off, the CMOS of mapped address set to do not use (disable), CMOS first boot device is set to LAN; optical drive and hard drive should be connected to different IDE data line.
B) If you forget the hard drive protection card administrator password for 1.0 ALT + 133, ALT + 144, ALT + 155, pop-up 10 groups (must use keypad), 3.0, enter the administrator password, I get a set of ENPQ data, and then dial 800, to get the password;
C) equipped with hard disk protection card machines, power on the phenomenon of red screen appears, you should use a dedicated tool program. Please see the relevant methods of the technical engineering communications;
D) for a boot disk, do not see some of the data disk, to check whether these data plate as the boot disk exclusive data disc; partition type is a bootable operating system recognition; in larger than 8 GB of hard drive, whether in 8GB established part of the boot disk of FAT16 partition (the boot disk support FAT16 file system); the boot disk is in the exclusive district of more than three;
E) hard disk protection card does protection function, to check whether the user has closed the hard disk protection feature to enable hard disk protection feature, you can enter the system before the press F4 to enable (prior should already be installed), if not, to Reseat the hard drive protection card. In Windows, you should check the driver software has been installed;
F) when restart with hard disk protection feature, the original system on the hard disk is not preserved, candidates of user original system is using a third-party software to partition. The current hard disk protection card can only be protected by the operating system comes with Fdisk to partition systems;
G) on a hard disk protection mode each time the restore, if not a graceful shutdown, but there have been many tips for disk scan, in administrator mode, joined in the Msdos.sys file autoscan = 0;
H) in the user mode, the phenomenon of garbled, need administrator mode run Setup.exe in the upgrade disc;
3 floppy disk drive
1) environment check
A. the diskette drive in certain cases, similar to the hard drive of the inspection method.
B. check the floppy drive:
A) connecting cable is installed properly, there should not be plugged in or plug in the back;
B) floppy drive connected location, with the value set in the BIOS conform thereto;
C) floppy drive power connection is correct.
C. floppy appearance inspection
A) floppy drive for foreign objects;
B) circuit boards and components for deformation, color, smell, etc.
D. the use of floppy disk media quality is poor;
2) fault points
A. check the floppy drive, software minimum system into the floppy drive, or remove a hard disk is checked after the judgment. And, if necessary, move out of out-of-the-box;
B. check similar to hard drive. But note: the BIOS on the floppy drive can read and write settings to allow or disallow;
C. check the floppy drive for reading and writing skills, their reading and writing checks, on the other hand is a floppy disk swap literacy checks that may have failed the floppy drive can write floppy in the floppy drive is a good read. If not, replace the floppy disk drive;
D. floppy
Most likely infected media, so the check, it is important to note that the virus check.
4. CD-ROM drive
1) environment check
A. check the optical drive:
A) CD ID jumper is correct, it should be connected to the cable position matches;
B) connection CDROM data cable is attached or connected backwards;
C) optical drive connector if it is damaged or the hard creases. You can replace the connector checks;
D) optical drive connector type optical drive specifications requirements;
E) optical drive power is connected properly, there should not be too loose or not plugged into place.
B. optical appearance of the check:
B) optical circuit board components for deformation, discoloration, and fracture defect phenomenon;
C) optical drive power socket of the connected PIN is soldered or removal of welding phenomena;
D) powered, optical drive post led is not illuminated or permanent; work led is properly glisten;
E) powered, to listen to the CD drive by running the sound correctly, there should be no abnormal noise and the noise is too large.
2) fault points
A. check the optical drive, replace the optical application software minimum system checks your hard disk. And, if necessary, move out of out-of-the-box. Check, using a bootable CD to boot to the optical drive of the preliminary examination. If you cannot properly read, then the software check minimum system. The first is the optical drive on;
B. check similar to hard drive;
C. CD-ROM drive performance check:
A) for the ability to read disk failure, first consider the effect of the antivirus software, and then use the random CD testing, such as fault recovery, repair, or replacement in accordance with user needs and the failure to deal with;
B) when necessary, through the Refresh CD formware check do not drive if symptoms disappear (e.g. because of the optical drive into a CD disc, causing the system is started for the first time, the optical industryFor normal, you can try this method);
D. operating system configuration check:
A) application of the operating system software can support the active CD drive technical specifications;
B) Device Manager settings are correct, the IDE channel settings are correct. Necessary to uninstall the optical drive driving cycle, so that the operating system to identify.
5. case
Case 1:
Problem description: Xiao Wang is a company of computer maintenance personnel, and Office machine for Lenovo's moon 2000 models, 13G hard disk, because a long time computer system and data is not maintained, the system up and running are slow, the c drive on the replication of critical data to drive d, the system after running Lenovo recovery software hides the partitions inside a Windows98SE to C disk. 10 minutes to the recovery is complete, restart normal again entered the Windows98 systems. After entering the system, however, found that the use of the extended partition PM Division lost large amounts of data are in the extended partition,? Xiao Wang awkward situation ...
Solution: first look at Lenovo machine instruction for random data, it is written, "may have on the PM's partition format does not support partitions with Fdisk ..." may be a system restore destroyed the original hard disk partition table, is there any way to solve this? post into MSDos or enter PM, a primary partitions and one extended partition does not have other partition information, then think of the software, enter the MSDos Diskman, run Diskman, first warned that the partition table is wrong, although still to hard drive Diskman recognition into two partitions, but it also has to redetect the partition table. Redetect the partition table is fully automatic and interactive two ways, choose the latter, Diskman began by-cylindrical test hard disk pre-existing partition table. It was a long time, the original three partitions including Lenovo system recovery software hidden backup partitions are detected, keep partition format, everything is normal.
Comments: user applications or users on the hard disk is partitioned off will cause a hard disk partition table errors encountered such problems do not worry, to analyze the cause of the problem, review the related information, such as software and the information that came with your computer, software or tools related to the settlement, if the hard disk works, related software or tool you know very little about, be sure to find the relevant information or to the person who asked.
Note: Diskman a hard disk partition table maintenance software that runs on MSDOS, environment, using the full Chinese graphic interface, without any support Chinese character system. To chart reveals the partition table of a detailed structure, supports mouse operation and support of large hard drive 8G above and UNIX, NTFS, partition, format, etc.
Case two:
Problem description: a user tianxi II 5311 models, users using random software NTICD-MakerPlus FileCD tools format of rewritable CDs while (BenQ CD-RW), progress rapidly to 100 percent, but no formatting is complete, forcibly close the dialog box does not close. Finally, the only end task. Hard drive with NTICD-MakerPlus burn, RIP and burn progress during the show, and prompts for burning the finished, will burn a good CD into your CD-ROM drive, prompt does not recognize the disc.
Solution: first consider is the plug-in NTICD-Maker FileCD software problems, software upgrade to V5.08 NTICD-Maker, V5.13, no solution, upgrading to V5.15 phenomenon remains the same, then see the version of FileCD and user original machine of FileCD version, as of version 2.0.10 follow-up is not erased disc capabilities have been improved. Consider other burning software, used NERO for testing (version V5.5.9.0), to use the software to perform a quick erased and then burn to disc, still occurs the above phenomenon. But SONY's CD-RW discs is not the problem.
Comments: erased disc and burn software and recorders have a great relationship, engineer in resolving issues can be considered from several angles.
Case 3:
Problem description: the optical drive of a user, the user has to purchase the CD drive, according to the user in the market to buy optical drive for testing, optical drive without any problems, test data, such as disk and VCD discs can be read properly, but returned home after installing CD, boot into the system, all placed in the CD drive letter of the disc in the drive are displayed only on CD-like tags. The user returns to your place of purchase to the CD-ROM installation to test machines, problems repetition.
Solution: after examination found that the optical drive data interface of a data line bending, causing the drive data does not identify.
【 Weak current college 】 computer passwords greatly entire (4)
Diskmgmt.msc Disk Manager (and PowerQuestPartitionMagic8.0)
DvdplayDVD player
Devmgmt.msc Device Manager (check the computer hardware, driver)
Dxdiag check DirectX information
Dcomcnfg.exeDCOM configuration properties (console root)
Dcpromo.exe installation wizard (XP is not available)
Ddeshare.exeDDE shared
Debug.exe check DEBUG
Dfrgfat.exeFAT partition Disk Defragmenter
Dfrgntfs.exeNTFS partition Disk Defragmenter (XP is not available)
Dfs_cmd_.exe configure DFS tree (XP is not available)
Dfsinit.exe distributed file system initialization (XP is not available)
Dfssvc.exe distributed file system server (XP is not available)
Diantz.exe produced cab files
Diskperf.exe disk performance counters
Dmremote.exe disk management part of the service (XP is not available)
Doskey.exe command line to create a macro
Dosx.exeDOS extensions
Dplaysvr.exe directly run help (XP is not available)
Drwatson.exe Dr. Watson error detection
Drwtsn32.exe Dr. Watson displays and configuration management
Dvdplay.exeDVD play
Dxdiag.exeDirect-X diagnostic tool
Edlin.exe command-line text editing
Esentutl.exeMS database tools
Eudcedit.exe creation program
Event Viewer eventvwr.exe
Convert EXE file to the exe2bin.exe binary
Expand.exe extract
Extrac32.exe solution CAB tools
Fsmgmt.msc shared folder
Fastopen.exe in memory for fast access hard disk files
Faxcover.exe fax cover page editor
Displays the fax queue faxqueue.exe
Faxsend.exe Send Fax Wizard
Faxsvc.exe start the fax service
Fc.exe compares two files of different
Find.exe find the line of text in the file
Findstr.exe to find the rows in the file
Finger.exe a user and display the results
Fixmapi.exe fix MAPI files
Flattemp.exe allow or disable temporary file directory (XP is not available)
Fontview.exe display fonts in the font file
Forcedos.exe mandatory files run in DOS mode
Ftp.exeFTP downloads
Gpedit.msc group policy
Gdi.exe graphical interface driver
Grpconv.exe conversion program administrators group
Hostname.exe displays the machine's Hostname
Internat input method icon
Iexpress Trojans bundled tools, system comes with
Ieshwiz.exe custom folder Wizard
Iexpress.exeiexpress installation package
Iisreset.exe restart IIS services (not install IIS, unavailable)
Internat.exe keyboard language indicator (XP is not available)
Ipconfig.exe view IP configuration
Ipsecmon.exeIP security monitor
Ipxroute.exeIPX routing and source routing control program
Irftp.exe wireless connection
Ismserv.exe install or remove a service in the ServiceControlManager
Jdbgmgr.exeJava4 debugger
Jetconv.exe conversion JetEngine database (XP is not available)
jeTpack.exe compressed Jet database (XP is not available)
Jview.exeJava command line mount '
Label.exe change drive's volume label
Lcwiz.exe License Wizard (XP is not available)
Ldifde.exeLDIF Directory Exchange command line management (XP is not available)
Licmgr.exe Terminal Services license management (XP is not available)
Displays the connection status lights.exe (XP is not available)
Llsmgr.exeWindows2000 license agreement management (XP is not available)
Start the license server llssrv.exe (XP is not available)
Locator.exeRPCLocator remote positioning
Lodctr.exe call performance count
Logoff.exe logoff the current user
【 Weak current College 】 how to keep your computer in standby power consumption is equal to zero
Use the computer how to saving energy.
For those who frequently use the PC, the PC power consumption has been a matter of concern to the business, General, TV's electricity consumption 80W, PC in about 250-400W. A PC power consumption of each month: If every hour to one day open 300W× 10 hours × 30 days a month = 90 degrees 90KW, that is, this is a conservative estimate. (Monitor power consumption: 15 inch, 17-inch, 19-inch monitor power consumption 80W 60W, respectively, of about 100W).
The computer is in sleep state, power consumption is about 7.5W, inexplicably in WindowsXP entered standby power consumption was reached 51.48W! description motherboard at this point in order to protect the data, but also in the consumption of electricity not small; even turned off the machine, as long as you haven't pulled the plug, energy consumption, just the computer has approximately 4.81W! like remote controls and intelligent switches, etc. in the let it more smoothly and electrical equipment, but also to electrical additional extra energy consumption — standby power consumption.
Often you can see some of the family or units equipped with anti-glare monitor, was originally intended to reduce the electromagnetic radiation of the monitor on the human body, in fact, this is a misunderstanding. Test certificate, anti-glare protection against electromagnetic radiation and not much effect, on the contrary, after installing will cause the image brightness decrease, in order to get the perfect image, the user will also increase the brightness of the display of load, causing electromagnetic radiation not drop back up, and increases power consumption, it is not worth the candle. So, has passed the certification of TCO series monitors can be assured, there is no need to install anti-glare.
Here are some energy-saving energy-saving proposals and measures
1. suspended computer, if you expect the pause time is less than 1 hour, it is recommended that the computer on standby, if the pause time is greater than 1 hour, it is best to completely shut down.
2, usually used when you want to shutdown the computer, you should unplug or turn off the power switch on the power strip and gradually develop the habit of total power loss, but don't let it is powered on.
3. unused peripherals like printers, speakers, and other time off. (The speaker is the large power consumption)
4, like CD/DVD drive, floppy drives, network cards, sound cards and unused devices in shielded in the BIOS. (Power consumption does not decrease too much longer to see also extend the service life of the equipment)
5, use the CPU cooling software.
6, lower display brightness. In text editing, some background to Dim, energy-efficient while protective eye sight, alleviate fatigue strength. When the computer is playing music, storytelling, stories, and so a single audio file, you can completely turn off the monitor.
7. many DIY were keen on overclocking. As the technology of fine, if not overclocked as capable of satisfying performance needs, or as few overclocked, both energy security and stable also.
In the standby state, device did not cut off the power supply, also failed to run the main functions, appears to be shut down, in fact there are fewer parts within the electrical circuits and components in electrical work, this state of standby power consumption is.
First of all, is the concept of the problem.
You can see that all people who didn't miss a closed the tap water that is a waste of resources, waste of money.
All the people saw the place does not need lighting during the day with a lamp that is a waste of resources, waste of money. While the PC shutdown of power but nobody knows, because it is invisible. Only instrument to measure. Often the vast majority of PC owners believe that: the computer since the shutdown, how will the computer shutdown power?: no, no, no power after? was also expressed that the computer is in a shutdown state, power is just a little bit, no fussing. This happens to people misunderstanding of cognition.
Secondly, the lack of attention. The reason is not the right idea.
As everyone knows, the computer is in a shutdown state, is an electro-mice, continues to steal electricity. Standby loss is usually refers to our most common-powered power also connect the motherboard, monitor, printer, router ADSL network Terminal, etc., in which case you would also like to + 5Vsb continued to Board, keyboard, mouse, and other devices continue to supply, at which point its standby power consumption to around 5W. Click on system shutdown, computer, monitor and computer peripherals (printers, scanners, ADSL network Terminal, routers, etc.) are still in power.
PC standby power consumption test: (multimeter model MS8215 MASTECH?)
Criteria: in a computer is not turned on
Test equipment for computer host 17 "flat screen monitors,
Results: the power consumption of power to instantly 176 w
2 seconds after continuous standby power consumption is 13.7 Watts
Today, computers have become indispensable in modern office help, is standing for learning and entertainment tool, but many people still do not know the computer misuse will result in large energy waste.
Assuming the authorities, units each computer work 6 hours a day, 2 hours, stand-off 16 hours, according to the current amount of our computers have 5299 million units to calculate the annual power consumption of only shutdown state a can save 6.2 billion kWh of electricity.
3. a majority of operators to focus on the customer's Internet environment and service levels, often overlooked power consumption costs. power consumption can be said to be one of the major cost-how to reduce power consumption, improve the operator's profit? of course, the less the better power consumption.
4. computer shutdown state, not actually disconnect the electricalSources of harm:
1. According to the authoritative Department statistics:
● Computer host home electronic products topped the lowest energy consumption
¡ÑThe computer energy-saving equipment each year saving $ 500 degrees
● My current computer ownership nearly five thousand and three million units
• Government sector energy expenditure exceeding 80 billion a year
2. in addition to the computer on standby power consumption, resulting in unnecessary waste of energy;
3. long power will make the electrical equipment is in a State of fever, thus shortening the life of electrical equipment;
4. in the face of natural disasters, such as: Thunder and lightning will along the wire when (or cable) striking appliances.
5. being a guest computer, its power is normal. The idle power consumption of the computer is also properly? answer must be in the negative.
The authors investigated many computer owners, their view is that there is a little bit of power consumption. These computer owners scale most in more than 300. This serves to show them in this regard is a blind spot. You can also say that they haven't the operating costs of the concept of energy saving.
Investigation of these Internet operator attendance up to 80% full time only 1 ~ 2 times. The authors on their own computer (only host and monitor different) test result: computer shutdown of electricity consumption 13.7 Watts. This is just one of the domestic use of computers, you imagine if this 300 computer without guests of power consumption will be? 300 * 13 = 3900 Watts, that is one hour of electricity consumed 3.9. Equivalent tariff: 3.4125 element. For attendance is not too high in terms of the Internet, I'm afraid that after 10 pm the following day at 10 a.m. time period guests blank opportunities. Then shut down power consumption: 300 * 13 * 12 = 46800 Watts: 46.8 kW, according to the General algorithm: a kilowatt hour of electricity consumed at one time. Then one day electricity consumption: 46.8 degrees about us electricity charges: 46.8 * 0.875 Yuan/degree-= $ 40.95 pay electricity bills each month: 40.95 * 30 = $ 1228.5. Payment of electricity per year: 1228.5 * 12 = $ 14742.00
Do not know. Attendance is dynamic, and may in fact than the above computed value or high point or low point. The above algorithm is normal.
How to keep your computer in standby power consumption is equal to zero
To do so in the normal use of the computer, the computer is idle power consumption to zero is not difficult, Taobao called "computer power saving zero power consumption in standby Po pc-powersaver control unit" by the computer operator control: the computer out of use, click on system shutdown, power off automatically with the commercial power supply, power consumption is zero, instead of approaching and zero-power-on time by the computer's operation, press the power on key on the host, you can normally use the computer. And the usual computer operation is no different. Mainly computer owners are willing to do it.
【 Weak current College 】 phonetic typing fast play ten tips
With the exception of a few professional typist, most people are using phonetic typing, use the most is the most convenient is the standard alphabet is smart ABC. If you don't use wubi typing, smart ABC is really easy to use. And skilled it will soon. Of course you can also learn more ways to speed up the speed. Here to collect a number of helpful articles, plus the use of some experience, and placed in the space, give you easy, convenient access to myself.
First, this is the most simple phrases.
When you enter "pajamas" phonetic "mianao", certainly not to the word, because the word is zero consonant ao, but if in "mian" and "ao" enter a separator between — ' (single quote), the coat is, you can try it, and so on, good night – wan ' an, pride-jiao ' ao ...
Second, fast input English:
Without switch, in Chinese input mode to enter a "v", and then type you need English to get: vlove — love, if you need to capitalize the shift.
Third, quickly enter symbols and units, you only need to enter a "v", and then enter the numbers 1-9 of any one, you can get different symbols, specific features are as follows:
Type: the type of symbol
"V1" variety of common and unusual punctuation
"V2" various types of digital
"V3" common symbols
The "v4" Japanese kana
"V5" Bopomofo
"V6" basic letters in various languages
"V7" ibid.
"V8" Hanyu Pinyin
"V9" linear special symbols
4. Enter the Chinese small digital is a very troublesome thing, one by one to find a waste of time. However, mastered the skills, it is not so difficult.
Just enter a "I", plus the numbers 1-9 of one of number you enter, the number of Chinese small came out.
Smart ABC also provides fast input unit, the hotkey is "I", "the initials" I + units, for example, to enter the "cm", then simply type "icm". Enter "m" and "1000", "100" and "ten" is in its initial consonant with "I", enter "Chin", simply type "iq".
On some common quantifiers also simplifies the type, enter "ig" and press space (or enter), will display the "a"; system provides digital input letters mean:
G [a] s and [10 to regain], b [100, Nigel] and q [thousand, thousand], w [million], e [million], z [m], d [article],
N [year], y [month], r [day], [t], t, k [g], $ [element], h [at] and f [minutes], [in], l
M [m], j [kg], o [degrees], p [lb], u [micro], I [NM], a [s], c [%], x [l]
-Five, enter uppercase numbers:
To enter the smart ABC in uppercase, such as "a" and "second", "three" or "next" and "II" and "triple", requires the use of shortcut keys is the "I" and "I" key. For example, to enter "3", simply type "i3" to enter "II", simply type "I2" (hold down the "Shift + I", you can enter "I").
6. Enter the date in Chinese:
In the smart ABC quickly enter the date of the method is similar to other input method, use the "n" and "y" and "r" to split the "year", "month" and "day", just to enter before adding the "I", if you want to enter the "00" on 8 May 2007, just type "i2007n5y8r". Case "I", there will be different, see article on.
Seven, pen input:
Smart ABC is not a purely phonetic input method, but a combination of sound, form input method. So enter the phonetic basis if coupled with the word first shape coding pens codes, you can quickly retrieve this word. The codes are replaced with the pen pencil is: 1 x 2 vertical 3 written 5 left bend hook 6 right hooks 7 cross 8 boxes. For example, enter "NG", enter: wu8 reduce retrieval page, retrieve scope significantly narrowed.
8, forcing the memory function:
Force memory function refers to the need to frequently used strings forced to add to the user lexicon, if you just use it as a Word-features an extended look down on it, too. To add to the thesaurus force "old cow" the word, for example, in the smart ABC input bar on right click, right-click menu, select "new" isdefined, then opens the "define new" dialog box, in the "new word" bar, enter "cow", "foreign key" bar, enter the old cattle of the initials "ln". Later you can use the following methods to enter: to enter in the input bar "uln" (preceded by a u), in which case the terms "cattle" appears in the input bar, and then press the SPACEBAR to keep on top of the screen. Remember, you have to lose a u.
9. stop positioning:
When you finish a phrase to find the location of the cursor on the screen is incorrect, don't worry, no to direct press the arrow keys to move around to a new location, And then press space on the screen, you can. However this is not universal, Notepad.
Previous word97 is also acceptable, now not the Office2003.
10, hazy memories:
Smart ABC in the input process will automatically remember user input history, just use the near term using the simplest methods based on incomplete information, thereby easily input used words. If you want to repeat the words you just entered, you can press the key combination CTRL +-, such as just enter "paradise Suzhou", followed by the word and press CTRL +-, the words "paradise Suzhou" was entered, and memories in the input content compare single, enter the content frequently repeated instances of use to be very effective.
Also some general not a common easy to forget, and note here, the cheat:
Width toggle: press SHIFT + space (SHIFT key plus a space). For example, ~ and ~, the width is not the same.
English punctuation switch: pressing CTRL +. (control key + period). For example,. and. $ And $ there ... And ^.
Sometimes a word forget spelling, we hit words, and then remove the excess words that Word to get what we want. In fact, you can: play Word spelling, press the "[" get the word's first words; press "," received the word of the last word. For example, play the "yyh [" have "noise" words. However this method sometimes line sometimes not, may and keyboard type or ABC's version, or the operating system version, not yet understand.
Next is something fun typing, not commonly used:
1. first ↗ ↘ ↙ how to fight? ALT + 43081, 43082, 43083, 43084
2, Ah. The Word spelling can directly play en, standard (that is smart ABC) will have to beat the n88.
3, wedding. ALT + 821206 press ALT and then press the number keys on the number keys on the loose after playing on the screen the ALT. If you want to use in word, Notepad, and then paste.
Also some rather primitive, most users know, there may not be aware of, and write in the following:-
Word quick play: z--in; m-no; a--Ah; b-c--is;; n-the-year; x-small; s--a; d-; f--hair; h--and-a-g; ... EU and so on.
Double word groups: sm--what; zd--know; my--no; wm--us, mn--next year; hj--environment ... EU and so on.
Three-word phrases: ymy--is there; hbh--will not be; gcd--the Communist Party; mzd--Mao Zedong; ybf--part ... EU and so on.
Four-character idioms: many idioms are capable of playing out, such as mmhh-Ma Ma nature nature; inside; brgh — — — — fabricated mxy; mmqm — strange; bfbz — serving with; wangmeizhike — tantalize; fanrongchangsheng — prosperity; jplj — exhaustion; buhuangduorang — not much ... EU and so on.
The above examples are just some of the more natural, with a new discovery. ABC of word frequency adjustment if open, you will be based on individual typing habits and the current frequency of typing words, automatically the most commonly used words and phrases to adjust to the front, not selected, press the space bar on the screen, very convenient. If you have changed the provisional article hit the first word or phrase, and want to return to the original state of habits, just close the current typing presentation again to open the new presentation.
To learn more, then some smart ABC IME-related way. When the windows98, smart ABC input method has a personal vocabulary, the person typing habits willmost commonly used phrase memory, use the longer the usual phrase to remember, the more the more fully, more to play, the more easily, smoothly and quickly, enter the period, the WinXP phrases memory function to cancel a thesaurus, inexplicably, we imagine, perhaps Microsoft in order to promote its own input method, deliberately undermine smart ABC, but never seen a few people use the cushrow child Microsoft pinyin input method, after all, that is to change the existing typing habits is equivalent to learn typing from scratch, there are a few people are willing to do this kind of stupid things when not necessary.
And Microsoft input method to commit the same fault is nowadays an endless stream of new input method, but seldom used smart ABC went into a new input method, although the new input method does have many advantages, such as large and comprehensive thesaurus and powerful phrase memory function, but requires others completely change existing typing habit, start over, to adapt and to establish new habits, this works too huge. As if you were to build Pavilion, fundamentally unreliable. Unless it is a novice.
Weak current College】 【public cloud vs private cloud patterns and differences.
<br> If you have already started to touch on cloud computing surface under nature, you may find that you need to know all sorts of "cloud", and your future life will not be just a cloud. In the "cloud" riding on .disputes, whether they exist between links, and how what is the difference between the one who is better in our enterprises play a greater advantage, has become a focus of discussion. <br> <br> Public and private clouds compared: whatever your deployment .based on cloud computing's unified communications (UC) applications or any other application, the method is the same. <br> <br> Now every business in considering the potential benefits of cloud computing, which is about one fifth of the company is implementing a .large-scale cloud computing projects. However the consolidated statistics are common on cloud computing. Enterprises in ways quite different, so they take technical routes vary, this means that the planning of public or private cloud computing will be full of challenges. <br> .<br> Planning based on cloud computing's unified communications (UC) applications and planning based on cloud computing, similar to any application - there are a few reasons. First, and most obvious, UC is an application, it will usually apply to UC .in public cloud or private cloud applications enterprise standards policy. Second, you should consider factors determine is used by the public cloud managed unified communications or private clouds, and the general application of the factors to be the same. You will save a lot of work .to maintain consistency. <br> <br> Cloud computing in three modes <br> <br> How to close to the cloud computing is different, partly because cloud computing and software as a service (SaaS). Most of the company previously provided .SaaS version of the software, and now they are portrayed as cloud computing service, in fact, SaaS is cloud computing in three different modes of one - a application software, middleware, operating systems and hardware as a service model. <br> < .br> The other two models have real differences. Platform as a service (PaaS) to provide users with remote hardware configuration, OS and middleware tool. Users are required to provide in the managed platform application software that runs on. Infrastructure-as-a .-service (IaaS) only provide users with basic hardware platform and operating system software, the rest of the user's own. <br> <br> These characteristics as a cloud computing as a service for enterprise; popular terminology called public cloud. Despite the .large sector enterprises are using some form of public cloud or are going to use, it is clear that most companies do not plan to use the "cloud" application processing critical tasks. The enterprise plan renewal meets cloud computing specification's own data centre to create private .cloud. <br> <br> Virtualization and cloud computing the difference <br> <br> On the technical level, cloud computing is an extension of the concept of virtualization, most enterprises have at least in some data centers in the application. In .a typical data center, when a server is assigned to a specific application, server utilization is low, the total server capacity, and cost of waste can be as high as 45%, which is what virtualization and cloud computing causes. Application due to the .growing demand, server capacity is too great, virtualization and cloud computing are to create a resource pool to solve the problem. <br> <br> Virtualization and cloud computing the difference between the two modes is to use the main office. Virtualization application on .each system and each data center level, cloud computing applications in multiple data centers. Many data center virtualization deployment can extend across multiple data centers and even wider range of server, however, it can provide LAN-like data center network communication link. In fact ., where the data center is connected to a high-speed device, by extending virtualization specification to create a cloud resource pools, the result is the best plan and virtualization deployment. <br> <br> For public and private clouds to prepare <br .> <br> If you plan to use private clouds, first of all should be concerned about how to enable a wide range of data center resources and general resource pool, and then is what the user is connected to the optional data center to access the .specified resource. If it is public cloud, so resources of connectivity is not affected by corporate control, so the only problem would be how to identify and connect to the correct cloud resources. <br> <br> User access to applications typically use a .fixed IP address and port number, or URL or URI (universal resource identifier universalresourceidentifier). Specifies the application to an actual resource and its identifier mapping will need to adjust to the specified resource. Use DNS or similar to address decoding of UDDI standard-based .standard technology. Amazon is similar to the NAT address, dynamic IP address system, if the application associated with the host changes, Amazon to reassign new addresses, and presented to users is always unchanged. <br> <br> Dynamic location may be sufficient .to provide cloud-the connection between client and server, but the specific transmission routes may change, hence the connection performance and security will be different. Public and private cloud applications in such circumstances, but public clouds variability will be greater, because the resource pool .to have greater variability of network performance so will be even greater. Some cloud provider will enable resource pool "regionalization" to reduce the application of the specified resources away from the user's risk, but this feature needs to be taken into account and verify each enterprise .application directory and the user is located. <br> <br> Public and private cloud security <br> <br> And standard data center application, the public and private clouds, applications, the same in the use of the Internet virtual private network .or client application connection technology may be inherent security problems. You must always take into account the resource location change and resourcesAllocation procedure in the hacking possibilities. In addition, public cloud application lacks the enterprise data center have physical security, and storage in the cloud of .sensitive data is especially important. <br> <br> Public cloud plan last consideration is the inter-process communication (IPC). As service-oriented architecture for application in the increase of components, transfer between components. If the application is assigned to .both the public and private clouds-one or completely run on public cloud above, supporting IPC transmission resources between connectivity is not affected by corporate control, and the connection properties on the application of the overall performance will have a significant impact. <br> < .br> Remember that cloud computing is essentially play resource efficiency and utilization of advantage, large enterprise data centers may be obtained from the public cloud scale applications for savings and economic benefits. In view of the growth in the cost of public cloud, if you design .and connectivity has been optimized with private clouds may be cheaper than public cloud. Make use of any decision of the public cloud, should carefully prior to use, and cost audits; for many users, using private cloud may still be best. <br> .<br> About unified communications (UC) and cloud computing, remember that unified communications (UC) applications may vary according to the different unified communications (UC) manufacturers / products have considerable differences is important, therefore, the relevant resources will also be different .. Many companies may think that unified communications (UC) is the primary resource, this may not be inclined to implement private cloud. If you are not active for your critical applications implement private cloud, you probably ought to unified communications (UC) consider using .public cloud. <br> <br> Old schema do not need to rebuild the security embedded virtualization <br> <br> Cloud times will be the next big trend in the cloud coming of age, is not it means that the security market as .a whole of innovation from a single security product transition to and cloud-related a series of security products, schema, or does it mean that the whole class before all the security products are again cloud environment framework of new information system? <br> < .br> Arthur? section Wilo: a very good news is you don't need in security products to schema design solutions in the cloud, the virtual environment has embedded these security technologies. But these security product technology and our RSA is currently available to customers .of these security products are the same. <br> <br> Can give you a few examples, we can see we have just as you described, in the current enterprise existing security frameworks, like GRC policy framework there in the middle of the Security .node in control and other SIEM technologies, is equally applicable to the cloud environment, which is the virtual environment of security schema. <br> <br> And the underlying background of SIEM we have already achieved and VMware virtualization technology virtual product integration, have .been embedded in the car, at the SecurityID also has completed the integration, we plan on doing integration is our access control products. There are also some of our other products on the Security node, and we will continue to increase, such as ERP we .already have plans, it is a very good investment protection for present uses RSA this product customers, later to virtual environments, they are using technology and current security technology is the same, but these security technologies are embedded in here. <br> <br .> At the same time I also want to talk about, I want to make an analogy, for instance, your House, your House is covered when you forget to refrigeration, heating and ventilation system, built after the you suddenly realized that these things are .forgotten, and you want to add in, this time after having added systems, for example in the area of refrigeration, heating may cause uneven distribution. So we believe that in fact at present virtualization environment or cloud computing provides us with a very good chance .we can start these schema was born when security mechanism embedded in it, instead of the existing security mechanisms. <br> <br> In fact, existing security mechanisms are added after, that is the Web-based ERP system, whether it is Microsoft .or Sun to provide operating systems and networking devices, in these early days of the birth, and no we are facing a variety of sophisticated network attacks forms of generation, so for these systems are adding these security mechanisms are back, but not as we do .in virtual environments can have the opportunity to truly secure mechanism embedded in. <br> <br>.
Friday, April 15, 2011
【 Weak current College 】 teach you 50 tips to XP users do not see your losses (1)
1, restore damaged WinXP system files
If WindowsXP systems file is damaged by a virus or other reasons, we can from WindowsXP installation disk to recover the damaged file.
Specific method: in a WindowsXP installation disk is searched for the corrupted file, it is important to note that the last character of the filename with the bottom line "_" instead of, for example: If you want to search for "Notepad.exe"
You need to use the "search Notepad.ex_".
Search, open a command line mode (in the "run" and enter "cmd") and enter: "EXPAND the full path of source file to the destination file's full path". For example: EXPAND
D:\SETUP\NOTEPAD.EX_C:\Windows\NOTEPAD.EXE。 One thing to note is that if there are spaces in the path, then you need the path with double quotation marks (quotation) included. Find a course is the best, but sometimes we search in WindowsXP-up could not we
The required files. Produce a reason is to find the file is in the "CAB" files. As the "WindowsXP CAB" as a folder, so for WindowsXP systems
, You only need to take the "CAB" files right drag and then copied to the appropriate directory. If you are using other Windows platforms, search to include the target file name in the "CAB" files. Then open the command line, enter: "EXTRACT/L target position of the CAB file full path", for example: EXTRACT/LC: \WindowsD: \I386\ driver.cabnotepad.exe. As before, as if there are spaces in the path, you will need to include the path with double quotation marks.
2. reject "group similar taskbar" Although WindowsXP "group similar taskbar buttons" setting while you can let your taskbar-less open window, clean, but some need to open more than one breed
The work of the window, very inconvenient. If you are a frequently used QQ such communications software and online chat, if you have more than two friends while talking to you, you'll find XP this default settings cause
Inconvenience DD every time you want to switch the conversation object, first click on the group, then the pop-up menu and select to talk to friends, and each buddy in the group show of the same icon, the conversation objects
Many times, you may want one-click to see who is really just reply, waiting for your response, and the wrong one, and start selected from a group, a lot of trouble. Apparently, this is not as good as the original open several Windows in the taskbar in the small window click once to start a chat. Change method: click on "Start → Control Panel → appearance and theme → taskbar and start menu" of the '. ',
The pop-up window, "the Group similar taskbar buttons" option to remove the front hook.
3, through the registry uninstall unused dynamic link
Explorer often left unused in memory of dynamically linked, in order to combat this phenomenon, you can open the registry editor, set the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\EXPlorer\AlwaysUnloadDLL = DWORD: 1 set it to 0, this function will be turned off.
Note: in order to enable the setting to take effect, you need to restart your computer.
4. clear the prefetch folder prefetch files
When WinXP use for some time, the prefetch folder in the file may become very large, it will have silian
File, this will slow down the system time. Recommendation: remove these files on a regular basis.
(Windows\prefetch)
5, WindowsXP weight loss method
The following methods to my existing winXP weight loss method, after use, and feel safer, the effect that
Out, at least you can reduce 300m space. Note: not recommended for beginners to use delete drive backup:
Windows\Drivercache\i386 directory Driver.cab file (73MB) but later we
Each time you install new hardware, you must insert the Windows installation CD delete system files backup (generally not how
You use): run sfc/purgecache command line to delete extra dll files: as long as you copy
Bay the installation file or if you have an installation CD, you can do so. Windows\system32\dllcache
The following files (minus 200 — 300mb).
7. learn about WinXP boot time despite the start-up speed is WindowsXP can make us feel satisfied
But Microsoft still offers a understanding of WindowsXP startup specific consumes
Start time of small tools, as well as view the CPU usage, DiskI/O, and so on, because the tools used
Graphics mode is displayed, therefore at a glance. Tools are available to download here.
8, recovery, EXE file association
EXE file association error very trouble, because this situation is caused due to virus
While anti-virus software is the primary file exe, since an error associated with the exe file, how can it run a
Antivirus software? fortunately XP provides safe mode command line tool for us to use, you can use
Command line tool to solve this problem. In safe mode input: assoc < space
& Gt; .exe = exefile <回车>, the screen displays ".exe = exefile". Now close the command reference
Shown in the character window, press CTRL + Alt + Del key combination to bring up the "Windows security" window, press the "shutdown"
Button and choose "restart" option, press to start Windows in normal mode, all exe files
Can be up and running!
9 and let the WinXP can automatically update
When Windows has been updated, automatically updating the system prompts you for Windows upgrade work, when
So this feature will go online before they will have a real effect. What is certain is that if you want to
For automatic update, the system will collect the user's computer and then transferred to the Microsoft site, pass
Have feedback information to decide whether to upgrade. This setting is in the "System Properties" window
, Switch to the "automatic updates" tab you can see that there are three options, choose the last "gateway
Closed automatically update ", so that the system does not appear often prompts you to automatically update, if you didn't
WindowsXP with genuine operating system, it is recommended that you turn off this feature, because he might not let you in
The knowledge of the system upgrade to version WindowsXPSP2, causing system instability.
10, in the Home version of IIS installed
We all know, WindowsXPHome Edition does not install IIS or PWS. In accordance with the General method, you
You can only upgrade to XPProfessional or using Windows2000, but only slightly so that means,
You can install IIS on the WindowsXPHome.
First of all in the "start" menu's "run" and enter "c:\Windows\inf\sysoc.inf"
The system will automatically use the Notepad to open the file sysoc.inf. Found in the sysoc.inf
"The [Components]" in this paragraph, and continue to find similar
"Iis = iis.dll, OcEntry, iis.inf, hide, 7" single line ", to replace the line
“iis=iis2.dll,OcEntry,iis2.inf,,7”。 After you save and close. The Windows
The disc into the optical drive 2000Professional, simultaneously press the Shift key to prevent autorun CD
。 In the run, enter "CMD" and then enter to open the command line, enter the following command line
The two commands, at the end of each line of the command is finished the carriage return (assuming the CD drive is drive d): EXPandd: clothing
i386\iis.dl_c:\Windows\system32\setup\iis2.dllEXPandd:\
I386\iis.in_c: \Windows\inf\iis2.inf now, open your control panel,
And click on "Add Remove Programs" icon, click on "Add after you remove Windows components". Please Tsai
Look in the "start" menu displays the operating system is, but after repair WindowsXPHome
Instead, have the option to add IIS. Then you can follow in WindowsXP
Windows2000 Professional or add IIS in the method, in this case we only installed
The WWW service. The system will start copying files, this may take some time. And in this purpose, please keep
Windows2000Professional CD in your CD-ROM drive. After the end of the installation, you can call
Open "control panel → properties and options → management tool," and "Internet information services management" has
Appear there. If you want to verify that IIS is running properly, only open IE, in the address bar
Enter "http://localhost" and then the carriage return, if you can see in Figure 3 interface (Figure 1),
Your IIS on all work. Finally there is another point of note: If you are in the installation process,
The system requires you to insert WindowWhistlerCD or need you provide exch_adsiisex.dll this
A file, it is because you follow the default option to install IIS. To resolve this issue, as long as the
Install IIS when you click on "details" and then uncomment the SMTP option (i.e., do not install
SMTP server), then copy the file does not need the two files. If you're an
The location of the figure 1 found that already shows the Internet Information Services (IIS) installation project,
But they cannot be selected, that's probably because you are using is from iis.dl_ and iis.in_
WindowsXPProfessional removed, replaced by Windows2000
Professional can continue in the normal installation. After validation, WWW, FTP, and several other clothing
Services after such modifications can be properly on the WindowsXPHome.
11, hiding part of the file name extension
In the ExplorerClick "Tools → folder options", select "hide known file types
Extension "will all file extensions are hidden. However, if you only want to hide the part file
Extension, that also use the Registry Editor: click Start → Run ", type" Regedit "
"After the carriage return, in Registry Editor, expand the [HKEY_CLASSES_ROOT] branch, find the file that you want to hide
File extension and expand, and then in the right window, create a new string value "NeverShowExt"
Quit Registry Editor and restart the computer, the type of the file name extension will automatically hide
To.
【 Weak current College 】 XP day-to-day application of skills and experience (16)
96, how to quickly install Windows98 on some command line parameters?
If the machine hardware correctly, then you can use Setup/id/ie/ih/im/iv is/fast install Win98. The meaning of these parameters are:/id skip disk space checking is not making the Setup disk/ie/im skip memory check/is not perform disk scan/iv does not display the Edition description
97, when you can not install WindowsNT4.0 produced 3 install disk?
Can. Use the following form: WINNT/b
98, why install WindowsNT4.0, to install the patch package (Servicepack)?
Microsoft's software patch that fixes some bugs in NT4.0, on the part of the software module for the upgrade, including NT4.0 Y2K remediation module. Only installed SP4/SP5/SP6 patches, to ensure that our applications run in a more complete and reliable platforms. Necessary, you should install the option package OP4 (OptionalPack4.0).
99, the operating system on the memory size any requests?
DOS,UCDOS≥1MWindow3.1/3.2≥2MWindow95≥8MWindow98≥16MWindow2000≥32M
100, how to use PDOS95?
PDOS95 is Windows9x with a Chinese system, MS-DOS mode in Windows9x. Use this method, access to MS-DOS, the State of the command line, type PDOS95 carriage return. At this point, the screen to the right displays a row yellow *** color text: "the way" Windows95 Chinese DOS, that has entered the PDOS95 Chinese characters. To input Chinese characters, press "Ctrl + space". Other function keys are: "Shift + space" you can toggle the "em/half-width", "Ctrl + Shift" to select input method. In command line mode to perform the way you can quit Quit, do PDOS95 Exit to exit MS-DOS mode and return to the Windows graphical user interface.
101, how to recognize the MSDOS.SYS file Windows9x?
Windows9x MSDOS.SYS file that is different from the pure DOS MSDOS.SYS. In Windows9x, MSDOS.SYS is a text format for the system configuration file, you can post on Windows9x State. Remove all attributes of the file, you can Edit or Notepad (Notepad) to edit it. [Paths] WinDir = C:WINDOWS indicates the Win98 directory WinBootDir = C:WINDOWS specified boot Win98 directory HostWinBootDrv = C boot drive letter [Options] BootMulti = 11 represents the you can enter the pure DOS mode, and 0 means that they can display the BootMenu = 11 represents multiple boot menu BootGUI = 11 represents power on after power-on Win98, 0 means enter DOS7.0WinVer = displays the Windows version number 4.10.1998 (4.10.1998 corresponding Windows98 first edition)
102, forget Windows CDKEY?
Forget the CDKEY, Windows can be found in the system registry to search by: run Regedit program, in Windows95 registry search string ProductID, string in Windows98 registry search, find the key value of the ProductKey is the Windows of the CDKEY number.
103, what are threads?
Thread refers to the process of instruction execution sequence, WIN32 platform support multithreaded programs, allow the program in multiple threads. In a single-CPU system, the system CPU time slice in accordance with the scheduling algorithm assigned to each thread, the thread is actually executed when, in a multiple-CPU WindowsNT system, with a program thread can be assigned to different CPU up executed. As a program of the thread is in the same address space, and therefore how to share memory, how to communicate, and so on, so you need to handle various synchronization issues between threads, this is a multi-threaded programming a difficulty.
104, how fast restart Windows?
When entering the shutdown screen, select the "turn off computer", hold down the SHIFT key, click the button [is].
105, simple shielding Windows auto-run feature?
Put the CD in the disc, or placed in the autorun program CD, first press and hold down the Shift key, and then push in the disc.
【 Weak current College 】 hard disk head number
Hard disk head is hard to read the data of the key components, it's main role is to be stored on the hard drive platter of magnetic information into electrical signal transmission to the outside, but it works is the use of special materials for resistance increases as the principle of magnetic field changes to read and write data on the disc, the head of the quality to a great extent determines the hard disc storage density. Currently more popular is the GMR (GiantMagnetoResisive) GMR heads, GMR heads use the magnetoresistance effect better materials and multi-layer film structures, this traditional head than before and MR (MagnetoResisive) reluctance tape heads more sensitive, relative changes can cause of magnetic field to big resistance value changes, thus achieving higher storage density.
The head is in the hard disk platters read write work tool, hard drive one of the most sophisticated of sites. The head is used in core coil winding up. Hard drive as you work, head through the induction rotating platter magnetic field changes to read the data; by changing the platter of magnetic field on which to write the data. To avoid Magnetic heads and disc wear, working state, the head of the high speed rotating platters, but not in direct contact with the disc, and only after the power is off, the head will automatically return to the disc at a fixed location (known as the landing area, where disc does not store data, is the starting position of the disc).
As the head of the nature of the work on its magnetic sensitivity and precision requirements are very high. Previous head adopts magnetic material, magnetic susceptibility, is not very satisfactory, and therefore early hard drive single disc capacity is relatively low, single disc capacity is big then the disc on the track density, magnetic induction enough, there is no way to accurately read the data. This results in earlier drive capacity is very limited. As technology evolves, head in the magnetic susceptibility and precision has made great strides.
The original head is reading and writing function together, the head of the manufacturing process, the technology requires very high, and for the PC, to Exchange data with the hard disk, read data far faster than writing, reading and writing operations both properties are also completely different, and this led to read, write, separation of the head, the not respectively work.
Thin-film magnetic induction (TEI)
Between 1990 and 1995, the hard drive using TFI read/write technology. TFI head is actually wound cores of. Disc in winding through the cores in the head on the induction voltage. TFI read heads can reach its capacity limit, because of the sensitivity of the magnet, but it's writing has weakened.
Anisotropic magneto resistance (AMR) head
AMR (AnisotropicMagnetoResistive) in the mid-1990s, Seagate company launched use AMR head of the hard disk. AMR heads use complete TFI head to write operation, but with a thin strip of magnetic materials as the reading component. In a magnetic field exists, the thin strip of resistance will change with the magnetic field, which in turn produces a very strong signal. Hard drive decipher due to magnetic field polarity change due to changes in thin section resistance, improves reading sensitivity. AMR head further increased areal density and reduces the number of components. Because the AMR changes the amount of resistance have a certain limit, the AMR technology can support 3.3GB/square inch of recording density, AMR head of sensitivity limit also exist. This causes the GMR heads of research and development.
GMR (giant magneto resistance GiantMagnetoResistive,)
GMR head has inherited the TFI head and AMR head with read/write technology. But it's read heads for the magnetic variation on the disks show a higher sensitivity. GMR head is made of 4 layers of conductive materials and magnetic thin films formed: a sensor layer, a non-conductive intermediate layer, a magnetic Plug and an Exchange layer. GMR sensor sensitivity than AMR head big 3 times, so to increase the disc's density and performance.
Hard disk number of the head depends on the number of discs in the hard disk, both disks are stored at the data, so a disc map two heads to work properly. For example, the total capacity of the hard disk, using 80GB single disc capacity of the disc, 80GB that only one disc, disk slices back have data, the corresponding two heads; and similarly 120GB hard drive capacity, uses two platters, only three heads, one disc side without head.
College】 【weak network switch buffer overflow caused by viruses.
<br> <BR> LAN switch is a very important data exchange, processing equipment, which directly affects the performance of local area network data transmission capacity and network transmission speed. .Normally, the switch device performance is relatively stable, especially for general two-story switches rarely a problem, but recently a unit of a local area network using ordinary floor switch there is not normal. .Taking into account this phenomenon rarely occurs, resolve the anomalies in the process is different, and now this unusual phenomenon to the process of resolving the detailed contributions out for my friends refer to the exchange! .<BR> <BR> Playback <BR> <BR> failure of a unit is not large-scale local area network, 10 offices in about 40 workstations, two models were connected to the same common 24 TP-Link brand switch .This two-story two switches as LAN switches, routers directly to the unit cascaded device, the router device and then through the broadband fiber optic lines connected to the network and the Internet, usually all workstations in the LAN can share access to each other, each .a workstation through the LAN routers have direct access to Internet network, the content of the target site. .<BR> <BR> Recently, some workstations in the LAN to access either does not work the other workstations within the network system to share content, can not access the Internet network, the content of the target site, but was able to access other workstations within the network, .also can access the Internet. .Taking into account a number of workstations in the LAN can access the Internet network, which means that the working status of local area network router device is normal, those who can not access the workstation is likely to be their own reasons or by the ordinary two-story with a problem caused by the switch. .<BR> <BR> Trace the cause of <BR> <BR> order to understand the specific cause of the malfunction, the author free from the LAN can not access the Internet to find a common network workstation, the workstation system, open the Run dialog box, in which the use of .ping command, followed by testing the local LAN device IP address, switch IP address, the router's IP address and found the IP address of the local LAN device can be through the normal ping, the IP address of the other two devices can not ping through the normal, which .that the work of the local workstation NIC device status is normal, the local LAN switching equipment and router equipment to the physical lines between devices may be a problem, in order to determine whether this problem caused by the cable network connection, I immediately hired the professional .cable test equipment to the cable connection on the target network connectivity test, the test found that the physical connection cable is normal. .Since the physical connection <BR> <BR> line is smooth, then why fault the workstation NIC device to switch between devices and network router equipment does not work ping line through it? .Confirm the work status of the LAN equipment is normal, will not fault the workstation is connected to the switch port status is not working properly, or to switch the entire second floor of what had happened there it? .Thought of it, I immediately connected along the cable network connection failure workstation to find the connection that failed workstation switch ports, I immediately try to switch to other switch ports to test and found that the tests are not normal. .I once again failed workstation connected switching equipment was carefully checked and found that the device control panel all the lights are not flashing at full brightness, it is clear this state is not normal, because normally when a switch port forwarding .to deal with online data, the corresponding port should be in the light flashing lights, and now the lights are not flashing all ports that connect to this story that the switch does not exist in the data forwarding all workstations act, then the two .layer switch all of the following does not work naturally workstations online. .Troubleshooting <BR> <BR> <BR> switch working conditions encountered in the second floor is not normal, we tend to look at the device as long as the restart will solve the problem, after all, the hardware layer switch quality rare; according to this .analysis, I immediately switch off the power switch failure, over a period of time to re-power, sure enough, to be stable after the failure to restart the switch, the LAN can not access the previous failure of the workstation immediately resume the normal network connection status. .<BR> <BR> Thought here, and LAN workstations can not access the fault even if some solution is successful, but who would have thought, but also every one hour, those who can not access the workstation again the same symptoms, this time .observed that Taiwan failed again when the switch device, I see the device control panel and all the lights are not flashing at full brightness, and this shows that the story took place in the same switch fault; after repeated testing and practice, the author found .Even if Taiwan is not connected to any workstation layer switch will occur at the same time period the same symptoms, this is why? .Why LAN switches work the other one two-story state is always normal? .<BR> <BR> The unit even though I know there are a lot of LAN workstations present in the system with different kinds of network viruses, but considering that the same two brands of ordinary two-story switches, connections are the same, or even their configuration is .exactly the same, and now only one switch device there is a problem, so I estimated that the switch must be the fault occurred in Taiwan, hardware damage, in order to thoroughly solve the problem, the only way is to replace the floor switch. .<BR> <BR> As the author has no ready-made switches on hand equipment can be replaced, do I intend to in the first local area network to conduct a thorough inventory of the virus, you must ensure that the new equipment in place before the switch, the entire local area network is very "clean .", and there is no network of virus or Trojan. .In the LAN cleaned all the virus program, after all, the author has conveniently failed to restart a bit switching equipment, switching equipment, after I saw the work of state failure and normal, because I was something in the body to first leave the fault .the scene the next morning at work, I saw that the way the working status of Taiwan, the switch failure, so I pleasantly surprised that even the working status of the switch has been normal; When I find a free workstation can not access the previous test system .found that the network connection status now they have returned to normal. .Continue to observe a period of time, they still have the normal state of the Internet, thus it can not access the workstation is part of the final settlement for the failure phenomenon, the phenomenon caused by this failure the ultimate "culprit" is obviously the LAN network virus. .Deep Analysis <BR> <BR> <BR> <BR> the failure phenomenon from the surface, is due to the second floor of the LAN switch caused by abnormal working conditions, in fact, the working status of the switch failure has been the impact of network viruses .; the existence of the LAN network virus, network virus had caused a local area network broadcast storm phenomenon, which led to failure switch buffer overflow error occurred, and ultimately making the switch occurred in paralysis, which is the failure of the lights switch on all ports .state are in full light is not flashing reasons. .When all of the LAN network virus cleaned after all the fault after restarting the switch after it disappeared buffer overflow errors, then it's working state can be back to normal, and after the virus does not continue to affect the network .switch, so the working status of the fault also be able to switch remain normal. .<BR> <BR> In addition, the LAN switch another reason why a network virus attacks have not been, is likely to be relatively stable performance of the switch, in other words, there may be components switchboard equipment failure phenomenon of aging, which .kinds of phenomena cause a failure the ability to switch network virus resistance relatively low, so that the same type of two layer switches, the natural state of their work is not necessarily identical to the. .<BR> <BR> By the network in order to avoid any symptoms of this virus, we set up local area network, you should try to use more stable performance, large-capacity switching equipment cache; while the use of legitimate anti-virus software regularly .to remove the LAN network viruses, prevent the broadcast storm phenomenon. .<BR>.
Subscribe to:
Comments (Atom)