Thursday, February 23, 2012

【 Weak current College 】 restore system protection and defense


System restore point if the restore time do not work, or restore the other questions? does system restore is only a display? it how you want to use to reach our want a result using the restore system environment estate users generally do not install other protection software, once the restoration software was penetrating, will bring a larger security threats.
Restore the system vulnerable because the disk device ** driver, that is with a disk device does not have a close contact, as long as the attackers use extraction or bypass methods have the disk requests sent to a real disk.
Penetrating fundamentals
You must allow read and write requests without restoring the system the physical drive, but rather to the underlying physical disk device. Here is a penetrating thoughts that a disk is from the upper-layer request published to lower, as long as the monitor send path, comparison operations can be used as a restore penetrating role.
Penetrating restore system, implementation of network attacks
Know how to penetrate the principle after the restore is very simple, since the restore system on a disk drive, as long as * lift * the * driver we and the relationship between the real disk, bypass ** relationship, it is equal to direct the restore. There are no more than one of the following three conditions:
I. DR0 device ** equipment chain pick chain. This method is actually on the removal of a harddiskDR0 ** device. Specify the device what ** device, first generation robot dog virus will this domain to zero, causing the restore system device is cleared, all the requests do not reach directly by restoring the system ** disk device. For preparedness of the restore system was successfully attacked. Most of the restore system in China had no way to fight against this kind of technology. But this technique also has some **, can only be removed in the physical device DR0. File request first reached the disk volumes, disk volume ** device removal, on the system. So the robot dog virus uses its own way of parsing a file system, to the implementation of network attacks.
Second, will they create a virtual disk device as the disk volume is mounted to the file system on a virtual disk read and write disk that insinuate to real issued a request to the underlying device. Relative robot dog, this approach does not require extraction with a disk system, you can pass the file on the virtual disk operation, the operation result is and on the real disk operation is the same, you can successfully penetrate the restore. Here is a way that he did not direct send disk read and write requests, send SCSI-REQUEST-BLOCK issued to lower disk device.
3. do not use a driver, penetrating directly into the user mode to restore the system. Disk system provides a set of passthrough command to send the request directly to disk, you can obtain disk information or even directly read and write disk sectors. IDE/SCSI/ATAPassThrough instruction through restore, RING3 use Devicelocontrel function to send the request. Most of the restore system on this ** is not strict, or not **, resulting in RING3 can reach under attack.
Restore system defense
We know that Internet/public places almost 100% of the installed equipment, in the event of a restore to restore the system to be penetrated, Tad visible to restore the system on the network is very important, active defense more major.
First, the more the underlying disk read and write to the monitor. They developed a greater degree of difficulty, the short term there is no way to form a larger scale. GuardField this system if you have some time can be modified, or you can use existing system compatibility, disk monitor chassis operations. Its advantage is you can even earlier monitoring
Second, the hook, you can just the right amount of self protection and recovery. If an attacker on the Defender is producing some targeted attacks, an attacker can easily fall into a passive pay to play. If you have to hook up the attackers have poorer.
Three, behavior management and prevention
1. the establishment of good security practice, do not open suspicious e-mail and suspicious Web sites;
2, many viruses exploit propagation, be sure to patch the system in a timely manner;
3. install professional anti-virus software to upgrade to the latest version, and open the real-time monitor;
4. to set the Administrators account is more complicated passwords to prevent virus spread through password guessing.
Restore system future trends
We now have GuardField protection, malicious attackers will develop some new updates to GuardField. They may be used which means that the speculation in two main areas: first, the underlying or updated disk read/write technology, bypasses disk IRP analysis, written directly to disk. Second, a tool for GuardField itself, on the destruction, delinking GuardField. After about two days to have the new driver, to decouple our GuardField.


Saturday, February 18, 2012

【 Weak current College 】 disk is write protected solutions


General colleagues in the u disk is FAT32 format, now let's put it into NTFS format:

If your USB disk is in the computer: a case study L plate

1, win + r, enter cmd.exe (the boot dos, windows inside) also can annex command prompt;

2. using the convert command, note the convert command is not available on the current disk conversion so in L: any letter, here to d: disk directory, for example;

3. Enter the following command convertL:/fs: ntfs/nosecurity/x

A preliminary solution to the problem.

Note: this method can be used only for emergency use. MIS-typing likely recurrence of the write-protection issues, testing ...

Migration Hongge primary (hi.baidu.com/xinbar)

2. changes to policy

When you restart after reinstalling the write-protection issues, please do the following

1. choose U letter right-properties-hardware

2. Select the u disk to Tsinghua PTIC as for example diagram

3. Select Properties-strategy

4. strategy to as shown.

The issue is resolved. Because I was in accordance with the above two steps of change, netizens can not convert format back to change the policy of method a try is feasible, it is best if feasible

3. modify the registry

1, win + r to open the registry (i.e. the start-run) and type regedit.exe

2. Enter the following directory HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies

If it has not established that the StorageDevicePolicies this

3. establish a DWORD value named WriteProtect and its value to 0

4. restart

The above is a general practice, but in practice, to carry out the above operations sometimes cannot solve the problem, the write-protect against this problem I have the following

5. restart with u restart, when the system reboots to u disk light flashing, unplug the USB thumb drive

6. system restart after inserting the USB disk, USB disk operation to resume normal

Additional explanation: the registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageDevicePolicies; HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageDevicePolicies WriteProtect value also in changed to 0;

Declaration: in addition to modifying the registry method two only when time resolved u disk write protection, carefully chosen, it is best not to carry out conversion format operation, if the format conversion, FAT32 to NTFS data is lost, when the USB disk is restored and can be formatted to FAT32 to NTFS FAT32, into simple, but in turn is in trouble, and go after the data is easy to lose.





Thursday, February 16, 2012

【 Weak current College 】 XP hard disk partitioning operations efficient and flexible



1. one minute partition and format the hard drive

Right click on the "my computer", select "manage" command. In the open "computer management" window, expand the "computer management" → "storage" → "disk management". Later, in the right pane to see the current hard disk partitions.


In the "Unassigned" disk space on the right click, select "new partition" command. In the partition Wizard window, select the partition type is "extended partition" and click "next", enter the new partition's size, and then in the settings section of the disk file format, and check "not formatted", the last click "Finish" button to complete the partition operation. Then open "my computer", right-click on the new partition, select the "format" command, use the quick format, then in under a minute to complete the partition to format the entire operation.

2. disconnection and merging disk partitions

If a partition on your hard disk capacity is too large, it can be split into two partitions. First of all the disk partitions of any file to another partition. After the "disk management" in the right-click the partition, select "delete logical partitions" command. After you complete the partition deletion confirmation, the partition in the list will be identified as "not assigned" disk space.

After that, in accordance with the above operation, in the "Unassigned" disk space, use the "new partition" command to set the new partition's size, and format the new partition of two.

Need to merge two partitions, you can save all data, use the "delete logical partitions" command, to obtain two blank in the "Unassigned" partition. Then select the "Unassigned" partition, right-click and choose "new partition" command, to complete the merge partition.

3. compression partitions increase disk space

If a disk partition space nervous, and the data in the partitions is not a regular reader, you can leave the partition can be compressed to "increase" you can use the space. Because the compressed partition must be NTFS disk formats, so for a FAT32 disk format partitions, at the command prompt window, execute the/FS "Convert drive letter: NTFS" command, the partition is converted to NTFS disk formats. Then, right-click the partition you want to compress and select "Properties" command. In the opened window choose the "General" tab, check the "compressed drive to save disk space". After you close the window, the system will be disk compression operation is complete we will find the partition free space increase.

4. the command line for the expansion

If a partition of the remaining space, you can also use the partition mode, expansion of to increase available space. At the command prompt window, execute the "Diskpart" command to start the disk management tool on the command line. Then execute the command "listpartition" to display a list of the current system partition.
Suppose you want to delete the third partition, as the second partition volume expansion, you can execute the command "SelectParTtition3" so that the third partition has focus properties, and then do one of the "DeletePartition" you can delete the third partition.

Then perform "Selectpartition2" command, so that the 2nd partition has focus properties, and then do one of the "Extend" command, it will be before delete partition space, automatically added to the partition 2. If the expansion of partition 2 uses NTFS disk formats, the expansion does not lose any data. The final implementation of the "Exit" command to return to the "my computer" you can see the hard disk partition has been expanding.

5. double upgrade the hard disk transfer rate

If you have two hard drives, with dynamic volumes in WindowsXP, can greatly enhance the hard disk transfer rate. First of all, the two hard drives in all partitions to NTFS disk formats. Then open the "disk management" window, use the right click on two hard drives, in the pop-up menu, select "convert to dynamic disk" command, the two hard drives are converted to dynamic disks.

Right-click the second hard after the black area, select "new volume" command. In the Open ** box, click the "next step", occurs 3 options, select the "striped". Click on the "next step", a second hard drive will appear in the "you can select" list, select the space below, enter the amount you want to control a single hard drive space. Click "next", for the establishment of a partition is assigned a drive letter. Click on "next", choose to use the NTFS disk formats, to quickly format the partition, then click "Finish". At this point in "disk management" window displays a list of partitions out of the gray area that is newly created striped volumes.

Open "my computer" and you will see the new partition, when this partition for data reads, you can reach nearly twice the data rate. Use the same steps for the remaining space is new as a striped volume, disk array can be disguised to enjoy the advantages of high data transfer rates.


Tuesday, February 14, 2012

【 Weak current college 】 online banking ones principle Trojan virus



With the rise of network users, all kinds of viruses, Trojans or ones that are naturally considered mouth delicious. In a number of pioneer released the fallen ones, and generate alternative ones there, a program, the network will be used improperly, to personal Internet banking account has no small losses, so that many netizens hurts a lot.
Trojan analysis
This does not last and the emergence of new online banking Trojans Win32.Troj.BankJp.a.221184 program, the viruses can be kept by third parties on the device and network communication, systems, Internet banking users. The presence of a horse but, first of all, the system will look for the system of "personal banking Professional Edition" of Windows and ** online banking account password, and then the virus will automatically replace a lot of system files and records, into the keyboard using delete corrupted system-u s e r I n I t E E Ⅹ. key login program, reach the system reboots repeatedly landing operation interface, so that the system was unable to get to the desktop that does not run, the virus Trojan horse can realize automatic updating, a serious threat to the user property and privacy.
On a single machine, the virus will be its file directory% windir% survive mshelp.dll, mspw.dll dynamic link library file, and then add the registry branch HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices power service items and attempt to back up the file% system% c a l c E E-Ⅹ. >% system% and% system% dllcachec_20218.nls u s e r I n I t E E-Ⅹ. >% system% windir% and% dllcachec_20911.nls n o t e p a d-E-E Ⅹ >% system% dllcachec_20601.nls file. Successful start automatically after virus find and replace system directory% windir% under c a l c E E Ⅹ.; % system% directory u s e r I n I t E E Ⅹ., n o t e a p E E d. Ⅹ;% system% dllcache directory c a l c E Ⅹ E,-u s e r I n I t E and E Ⅹ. n o t e a p E E d. Ⅹ files to hide up to depth.
Thus, a virus Trojan horse still no end own consolidation functions that will be created under the system root RECYCLER in Paris. Folder to contain viruses.
Virus cleanup process
When a network user accidentally infected their virus Trojan horse, you should clean it as soon as possible out of your computer, in accordance with their respective computer virus emergency response capacity, provide two scenarios here:
Method a, use the remote registry repair
As the system default, the remote registry service is turned on, at LAN users can remotely connect to the registry editor to modify the infected computer registry. First run of start menu items enter regedit in the registry editor, click the file menu to open the connect network registry project, in which you enter the infected computer IP address of the machine name (Note: the connection is successful if the other computer will need a username and password you will need to enter).
Then, locate the registry branch HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionImageFileExecutionOptions will its u s e r I n I t E E Ⅹ. delete the program (Note: sometimes there is no monitor, can't find virus hijacking of u s e r I n I t E E Ⅹ., so at this point, the project shall be found registry branch HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWinlogon, modify the Userinit key under it as the system default value C: N D W O W I S s y s t e m e r s 32 U n I t I-E Ⅹ E), if u s e r I E n I t E been Ⅹ. viruses, you can use the Windows installation CD after the quick fix to restore u s e r I n I t E E Ⅹ. program file.
Last will use DOS commands will be virus renames and moves c_20911.nls reset command as follows: copyc: windowssystem32dllcachec_20911.nlsc: windowssystem32 finished restart the computer, the system can be back to normal.
Method two, after booting WINPE CD repair
First of all users on the computer starts, press the delete key to enter the BIOS, set up your computer to boot from the CD (Note: various brands of computer into a slightly different BIOS, refer to the stability of their instruction action), the setting is finished WinPE CD into the optical drive, and then press F10 to save the exit, then the computer restarts, enter the CD interface.
Access to the WinPE virtual system, locate the registry branch HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionImageFileExecutionOptions will its u s e r I n I t E E Ⅹ. delete the program, locate the registry branch HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWinlogon, modify the Userinit key under it as the system default value C:WI N D O W S s y s t e m e r s 32 U n I t I E-then browse Ⅹ E, WinPE CD, i386 directory system32 folder in the u s e r I n I t E E Ⅹ. procedures are copied to the system's disk under windowssystem32 path.
Finally, remove the CD and restart the computer, virus hijacking of u s e r I n I t E E Ⅹ. will return to normal, the operating system will boot normally, repeatedly restart does not occur, the issue is resolved.
Virus prevention
The virus is not terrible, terrible virus manufacture zhezhixin. Network users must always be vigilant against property loss, but in the face of network users, in the early days of the end to facilitate what method for anti-virus, intrusion?, in fact, in the network and have no real security system, only the relative security of the platform. If you want to move from network threat reduced to the minimum, then the user should note the following points:
1. do not randomly open unknown sites and instant messaging software delivery Web site, not free to receive and click on the unknown or unidentified program (includes: exe file, picture, animation, movies, music, eBooks, etc) to prevent the Cntc.
2. open the system patch for the Automatic Updates feature, and set daily native installed security software upgrades to the latest version. To communicate on the network that you want to open the firewall, the firewall is not installed by the user shall, as soon as installed, this prevents when computer a strange program for remote connections, prior knew and are audited.
Third, to not use antivirus software on a regular basis or third-party security tool to scan your computer completely, for instant communications users such as QQ, QQ to use on the system into the patch doctors and detect ones from here, to avoid poisoning in horses infected network Bank.



Sunday, February 12, 2012

【 Weak current College 】 often following things will look manually killed Ma method



1.) check registry

See HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrenVersion and HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion, all with the "Run" at the beginning of the next jianzhiming have suspicious file name. If so, you need to delete the corresponding key value, and then delete the corresponding application.

2. check the startup group)

Trojans are hidden in the startup group if you are not very subtle, but here it is automatically loaded to run better, so I still have Trojans like here resides. Start the Group folder: C:\windows\startmenu\programs\startup, the location in the registry: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell

FoldersStartup="C:\windows\startmenu\programs\startup"。 It is necessary to pay attention to frequently check this two places!

3.) the Win.ini and System.ini is Trojans are fond of hidden places, it is necessary to pay attention to these local

For example, the Win.ini [Windows] section of the load and run back in normal circumstances is not indicated to what program, if that is going to be careful, and see what; in the System.ini [boot] section of the Shell = Explorer.exe is loaded after the Trojans and the good place which, therefore, to note here. When you look into this: Shell = Explorer.exewind0ws.exe, please note that wind0ws.exe it is possible that the Trojan server-side program! soon check.

4.) for the following files listed will diligently checks, Trojans are also likely to hide there

C:\windows\winstart.bat、C:\windows\wininit.ini、Autoexec.bat。

5.) if the exe file to start, then run this program, see the Trojan has been loaded into memory, the port is open. If so, then either the file to launch the program, either the file bundled Trojan, had to find a program, and reinstall it.

6. start the breed horse) is a way, it is only in a specific case of boot

So, usually pay more attention to your port, take a look at the running program, use this to monitor the most Trojans should be no problem.

7.) If you think the above method is too difficult, there is a simple point:

Proper use of anti-virus software, is the prevention and elimination of Trojans easiest way!

Friday, February 10, 2012

【 Weak current college 】 computer tips you know how many (1)



1. reloading the WindowsXP without activation

If you need to reinstall the WindowsXP, usually must be reactivated. In fact as long as the first activation time, backup good Windows\System32 directory in Wpa.dbl file, there is no longer an offering for activation. After the reload WindowsXP, you only need to copy the file to the directory above.

2. How do I know my WindowsXP is activated

Open start → run, in the pop-up dialog box enter: oobe/msoobe/a, carriage return after the system will pop up a window telling you whether the system has been activated.

3. close the zip Folders feature

Do you think the zip folder in WindowsXP functionality is too slow, features are not attractive? if so, you can open the start → run, in the pop-up dialog box enter: regsvr32/uzipfldr.dll, carriage return after closing ZIP Folders feature.

4. let WindowsXP can carve a ISO file

WindowsXP has not provided direct burn ISO files, but you can download a third-party plug-in to add this functionality to the system. The plug-in download address: http://members.home.net/alexfein/is...rdersetup.msi.

5. the landing interface background color

Open the registry editor, locate the [HKEY-USERS\.DEFAULT\ControlPanel\Colors], the value of the Background to "000" (without quotation marks) so that the logon background is black.

6. completely uninstall XP

Some friends in install WindowsXP found that he does not like the operating system, then you can use the Windows98 CD to boot into DOS, and then type:
format-ur

This will delete all files in XP, and you can reinstall the Windows98/Me.

7. the system for help with straw

When you suspect that the system to restart the computer before the changes can lead to failure, you can start pressing the F8 key when the system, select "last known good configuration" to restore the changes made to your system.

8. recovery hardware previous driver

Once you have installed a new hardware driver found in system instability or hardware does not work, just in the "Device Manager" and choose "restore" button on the driver, you can revert to a previous normal system status. But you cannot restore the printer driver.

9. automatic login

Click Start → Run, enter "rundll32netplwiz.dll, UsersRunDll" (without quotation marks), and then remove the UserAccounts "Usersmustenterausernameandpasswordtousethiscomputer", click "OK", then in the pop-up dialog box, enter you want your login user name and password.

10. fast shutdown or restart shortcuts (scheduled)

Click on the desktop, right-click, select new (shortcut from the wizard, enter the location is: C:\WINDOWS\system32\shutdown.exe-s-t10 (one-s can instead-r, restart, and-t10 represents a delay of 10 seconds, you can change this number). Finished the shortcuts, follow the above method to specify an icon for it. The fast shutdown or restart of skill displayed a more beautiful dialog box prompts shutdown (restart), and you can add the "-c" I want to shutdown! "," so the sentence would be displayed in the dialog box, of course, you can write the text, but it is necessary to pay attention to could not be more than 127 characters.

11. shutdown, restart, as long as 1 seconds

If you want instant shutdown WindowsXP, you can press CTRL + ALT + DEL, and then in the pop-up Task Manager click on the "shutdown" → "shutdown", at the same time, hold down CTRL, and less than 1 seconds you will find that the system is turned off, just in the blink of an eye. Similarly, if the "shutdown" menu select "reboot", you can quickly restart.

12. find missing the Quick Launch bar

Move your mouse to an empty area of the taskbar, click the button from the pop-up menu, select "Properties" in the pop-up window, select the "tray" tab, and then from the "taskbar appearance" box in the "show quick launch check box select", "OK".

13. batch file rename

WindowsXP provides batch rename files in Explorer, select a few files, and then press F2, and then rename these files, so that all the selected files will be renamed to a new file name (in the end plus the incremental number).

14. quick lock computer

Right click on the desktop, in the shortcut menu, select new "shortcut", then the system will start the Create Shortcut Wizard, in the text box, type "rundll32.exeuser32.dll, LockWorkStation", click on "next",In the pop-up window, enter a name for the shortcut, click on "Finish". Of course, the simplest way to lock your computer directly Winkey + L.

15. let two-button mouse with scroll page features

In Control Panel, double-click the "mouse" item in the pop-up "mouse properties" dialog box select "ClickLock" bar "start click lock" keys. Then click on "settings" button in the pop-up "click lock settings" dialog, move the mouse to the shortest, click on "OK" to save. Open a Web page, click on the page scrolls, scrolls off the page, move the mouse up and down are not far away, you can implement this functionality. Once again click on the page scrolls can turn off this feature.

Wednesday, February 8, 2012

【 Weak current college 】 computer tips you know how many (2)



16. let the WindowsXP-read letters

Find the "accessibility" group "Narrator" program, click on the "voice" button, enter the "sound settings" interface to a set and save. When you put the mouse pointer to the dialog with English letters, menus, and buttons, heard a male voice reading the English

17. restoring Windows classic interface

Many people install WindowsXP first feeling is Windows becomes beautiful. Just a pity that beautiful price to consume us this is not rich in memory and memory. If you want to restore to and classic Windows-like interface and use, right click on the desktop, select "Properties" command to go to the "display properties" in the settings window. Here are the "theme" and "desktop" and "screen saver" and "look" and "set" five tabs. In the current tab's label will have a yellow highlight of bright colors, the default is the "theme" tab, where we as long as the "topic" drop-down menu, select "Windows classic", immediately you can see in the preview window displays the results, at the same time, the appearance tab contents may be changed.
Note: the "topics in WindowsXP" and the "appearance" tab are closely related, as long as you change any of these options, in another tab will see the appropriate change.

18. recovery "start" menu

WindowsXP new "start" menu or very convenient, the impact on system resources is not great. If you like the classic menus in the past, right-click the taskbar, select "blank space" in the menu, enter the properties of the "taskbar and start menu properties" in the settings window, select the "Start menu" tab, select the "classic Start menu" to return to the previous image.

19. optimization of Visual effects

WindowsXP fuck with interface is really nice, good looking behind to consume large amounts of memory as a cost, relative to the speed and appearance, we prefer to choose the former, right-click "my computer", click on "Properties/Advanced" and in "performance" section, click on the "settings/Visual effects", here you can see the appearance of all the settings, you can manually remove unwanted features. Here all the special appearance settings such as fade, smooth scrolling, slide open and so all of the Visual effects are closed off, we can save a lot of "memory".

20. disable unnecessary services components

WindowsXP and Windows2000 can as such as an HTTP server, mail server, FTP server, so whenever the WindowsXP booting, as too many service was launched, there are many services for us, the average user who is totally useless, so off they are a good choice. Operations by right-clicking "my computer", select "management/services and applications/services", you will not need to disable the service component.
Note: some services are necessary, close the WindowsXP will make the system to crash. View details for confirmation before prohibition.
Editor's Note: for WindowsXP common 90 service, there will be a special section of this article.

21. to reduce the startup project

Many applications are made at the time of installation is added to the system startup group, each time the system will auto-run, this will not only extend the start time and start the finished system resources have eaten a lot! we can reduce system load at startup of the program by selecting "start" menu's "run", type "msconfig" start "system configuration utility", enter "Startup" tab, in this window lists the system startup, load the project and source, look if you need it automatically loaded; otherwise, clear the check box in front of the project, the less loaded project, initiated the faster speed of nature. This requires a reboot to take effect.

22. turn off System Restore

"System restore" function is the Windows family of operating systems, an important characteristic when Windows runs after the problem occurred, restore the operating system. "System restore" Although often mistake people useful, but it will make your hard drive at the height of the peak, you will find that your hard drive is always busy, because WindowsXP to record actions for future restoration. If you have confidence in ourselves, then don't use it because it can occupy a lot of memory.
Turn off System Restore feature, click "start/all programs/Accessories/System Tools/System Restore" in the system restore interface, click "system restore settings" and enter "system restore settings" window, clear the "all drives on the turn off System Restore" check box so that it will delete the WindowsXP backup of system restore points, freeing the disk space it takes up.
Generally speaking, in order to take account of the system performance and system security, I propose to open the letter WindowsXP System Restore feature.

23. turn off automatic updates

The "automatic updates" is WindowsXP in order to facilitate user upgrade system and introduced a new feature, this feature can be Microsoft launch system upgrade patches or system security patches, automatically remind users to upgrade their systems, but this feature has a requirement that the user must always online, but for those of us less iron and Silver's "poor", this requires a bit demanding, so we put the "auto upgrade" feature off, changed to "upgrade" manually.
Turn off automatic updates for specific operations by right-clicking "my computer/properties/automatic updates," in the "alert settings" sectionSelect the "turn off automatic updates. I will manually update the computer ".

24. closing the remote desktop

A special feature of this feature is you can let others on another machine, and access to your desktop. In the local area network, this feature is very useful. For example you have a question you can ask for help from colleagues, he can do to you, directly through the "Remote Desktop" to access your machine to help you resolve the problem. But we only have one computer of ordinary users, this feature is redundant, so we put it off, don't let it stay there wasted memory. Specific action is by right-clicking "my computer", select "properties/remote", "Remote Desktop" in the "allow users to connect remotely to this computer" check removed.

25. disable hibernation elimination

WindowsXP-Hibernate can put the memory of the current system state completely saved to disk, when you next boot time, the system does not need to be loaded, the system initialization process, go directly to your last hibernation state, so start very quickly. But it can take up a lot of hard disk space (and the size of your memory), you can go to "control panel/power/sleep" option to turn it off in order to free up hard disk space, when I go to when you want to use to open again. Click "Start/Control Panel/power management/sleep", "enable hibernation" before check out.

26. turn off the "automatically send error report" function

We certainly have it in WindowXP, once a program terminates abnormally, the system will automatically popup a dialog box asking you whether the error is sent to Microsoft, this is XP "automatically send error" function, it can send error information to Microsoft's Web site. Although Microsoft has repeatedly pledged that can provide strong security, does not divulge individual privacy, but the information sent to Microsoft may be included in your viewing or editing of document information, maybe this is contains personal privacy or company confidential, so if you want to protect their rights, we should still put this feature off. Click "Start/Control Panel/System/Advanced", click "error reporting" button, and then select the "disable error reporting", the following "but notify me when critical errors occur" can be selected.

Close the "Internet time synchronization" function

"Internet time sync" is to keep your computer clock each week and Internet time server for a synchronization so that your system time is accurate, however this feature for us is not very useful, but also may cause panic. In General, as long as you install WindowsXP later synchronize the time on it. So we need to turn it off. Specific actions are: click "Start/Control Panel/date, time, language, and regional options" and click the "date and time/Internet time."

27. reasonable set virtual memory

For virtual memory files, WindowsXP security defaults are always located in a large, waste a lot of hard disk space, in fact, we can set the value of it. By: go to "control panel/system/advanced/performance/settings/advanced/virtual memory/change", came to the virtual memory settings window, first determine your page file where a drive letter, and then set the other letter drives page file all disabled. Suggest you give it is set to a different partition, instead of the default system is on a partition, you can improve the page file read and write speed, help system running quickly. According to Microsoft's proposal, the paging file should be set to the memory capacity of 1.5 times, but if your memory is relatively large, it takes up space is also very impressive, therefore, recommends that if used with 256 MB of memory capacity, set to 1.5 times, maximum value and minimum value, if in the above set to 512MB memory capacity of half totally feasible.

28. delete extra documents

There are many files in WindowsXP normally we rarely used, placed on your hard disk, wasted space, reduce system performance. We can put these to use couldn't file deletion, you need to delete the file are:
Help file: C:\Windows\Help directory.
Drive backup: C:\Windows\drivercache\i386 directory under the Driver.cab file.
System files backup: the average user is not available, use the command sfc.exe/purgecache deleted.
Fallback DLL files: C:\Windows\system32\dllcache directory.
Input method: directly at C:Windows\Ime folder delete chtime, imjp8_1, imkr6_1 three directories, which are traditional Chinese, Japanese, Korean input method.

29. remove hidden components in WindowsXP

WindowsXP in normal after installation, automatically installs many components that have a lot less than is usual, installed in the system will take up a lot of space, decrease system performance, we can use this method to delete unused components.
Use Notepad to modify C:\Windows\Inf\ directory Sysoc.inf file, use the find/replace feature in the Find box, enter the "hide" (a comma followed by hide), will be "replaced" box is set to null. And choose replace all so that all the "hide", are removed, filed exit, and then click the "Start/Control Panel/Add or remove programs", you can see many usually see components, select the unwanted programsDelete can be.

30. clean up junk files

WindowsXP in normal use will produce extension TMP, BAK, OLD, junk files, you can use the Windows search feature to find these files, and then delete them. In addition, the default is WindowsXP system failure error event and write debugging information, which information we can completely abandoned. Clicking the "Start/Control Panel/System/Advanced/startup and recovery," empty "event being written to the log file," "write debugging information drop-down box select" "no".


Monday, February 6, 2012

【 Weak current College 】 purchases four misunderstandings of the digital camera


The camera can be regarded as the last few years just pop up a digital product, QQ chat, video conference, is it a thirst. Even miles between friends, as long as we have it and the Internet, we can speak of "face to face", very convenient. With the growing popularity of broadband by now, the camera is also rapidly developing, family, Internet cafes, offices, can see it, to introduce consumers to buy a camera that is easy to fall into four major mistakes.
Myth 1: pixels higher the better?
  
"This is how many megapixels?", this is a lot of friends to buy a camera is asked most frequently in a Word, but businesses often brag about it in this regard, the big blow products how to how good, how the pixels high, how how to clear the screen. So, what exactly has played pixels of a pixel? is higher, the more clear image?, we know in fact not the case, the image sensor has a number of photographic elements, each of the photographic unit corresponds to one pixel, the more pixels, the image is generated. And as for the image if it is clear, light look pixel but no, it's also the lens material, software, processing, and other aspects are closely linked.

In addition, in the market we have common camera pixels are generally 30 million or 35 megapixels, and some businesses tend to say that their products can reach the interpolation 120 megapixels, which is all about?, the camera is using the software interpolation work out, simply put is 640 x 480 pictures widen to 1024X768, then use the software calculates the picture resolution of differences between the points, the middle color of the part of the fill color of calculation software. Do while output pictures, but the quality of the image and no real improvement, or even possibly serious distortion.

Therefore, we purchased the camera must be kept in mind: pixels and the image sharpness is not absolute.
  
Myth 2: CCD than CMOS?

In fact, the structure of the camera is not complicated, itmainly by the DSP (master IC), SENSOR (photographic equipment), LENS (lens) and peripheral circuits and software driver combinations. With photographic devices is a major technical core, its principle basically consistent with DC, DV. In today's digital imaging fields, photosensitive cells simply CCD or CMOS, including former development time longer, in DC or DV areas more widely applied; and our common camera you use relatively inexpensive CMOS-sensor. But you can never think that a certain ratio using CCD CMOS camera, it's only manufacturer of selling points too! small series have used a large domestic 1XXX element of the camera, the sensor is CCD, however the actual use of results and compare "COMS camera" is not an absolute advantage, even in clarity also slightly less.

Therefore, we buy the camera, don't blindly believe businesses, use COMS's camera isn't the difference than CCD, we need to spend more than 10 times the money on?

Myth three: lens really matter?
  
A lot of friends when buying a camera, just think of cheap or light thinking pixels, completely ignored the lens is good or bad. The camera's lens is made of glass or plastic lenses. Glass lenses are not only more expensive than the cost of plastic lenses, light transmittance and imaging quality also has a large advantage. However, many small plants, in order to save costs, and the pursuit of high profits, often reduce the number of lenses, or use the cheap plastic lens. Although these products are much cheaper in price, looks very attractive, but the actual image is but it is unable to compliment.
  
So we buy the camera, not just for the sake of cheap, or try to choose glass LENS of the camera as well.

Myth 4: Mike function really practical?
  
Individual merchants in marketing their business camera, touted the camera's Mike function. UH! camera + mic sounds all well and good, but if you buy a home with you, you will find, in fact, did you imagine so chic: video chat, in order to enable each other to hear your voice, you need to reach the camera neck, to no, you have to simply hold the camera when the phone is used, of course, at that time can see you and that is another matter.

Of course, the we do not rule out some excellent quality MIC effect, good camera does occur, but if this camera and ordinary post is too large compared to it, we really need to buy? as single a MIC, the effect is excellent, price/performance ratio and high, why?

Therefore, we buy the camera, never too much about those "chicken" function, there is no good, of course, it does not matter, there is no need to waste money in these areas.







Sunday, February 5, 2012

【 Weak current College 】 a computer host with two monitors and two sets of keyboard for twin share a host---Power By 【 China power house network 】


In general you want to set up a local area network, the two hosts were indispensable, but even the simplest-to-peer networks also need two network cards and twisted-pair, better now, and as long as the host has two display interface, connect both monitors and two sets of keyboard, and then use BeTwin software (http://download.enet.com.cn/html/060562002032501.html) can let two people simultaneously with this host. From the equipment cost, the advantages of this option is quite obvious. BeTwin supports up to 4 users, relative to the LAN hubs, routers, and other inputs, saving a lot of costs.


Easy hardware connections
Since most users of the computer can only receive one monitor, so it is first necessary to resolve the problem, dual-display-shows the programme there is a lot like AGP video card and PCI video cards programme, onboard video and PCI video cards, PCI video card + PCI video card programmes and a dual-head video card programme.
To-head video card, for example, if the video card has two D-Sub interface, you can directly use dual VGA output to display, if the video card is a D-Sub interface and a DVI connector, connect the two D-Sub interface, you will need to purchase a monitor DVI go D-Sub adaptor, and then put both monitors respectively, two video cards. First of all, the primary monitor is connected to the first D-Sub interface, then the secondary monitor is connected to the second D-Sub interface, if the second interface to DVI interface, DVI go D-Sub go connector to the DVI connector on the video card, and then the secondary monitor is connected to the Ext connector (Figure 1).

Figure 1

Then connect the peripherals, in General, each user needs to configure a set of mouse, keyboard, this is the most basic needs. Users can use PS/2 interface with USB-keyboard, USB keyboard, or use the double. In addition, you need to host has two audio, dual sound card application is relatively simple, as we can on the basis of the integrated sound card, you can install a PCI sound card. In addition, various USB game handle can also be very good support, everything after installation is complete, the system will detect multiple monitor, mouse and keyboard. Note that if a monitor, keyboard, mouse, any one of them is not connected properly, can result in WindowsXP BeTwin configuration system error.


Simple device settings by default, only the primary monitor will display that to achieve the dual display, you need to enter the "display properties" in the "settings" tab, you can see two display devices, select the second monitor, and then click the "extend my Windows desktop onto this monitor", confirmed the second monitor will show the desktop, and the mouse cursor can be moved between the two monitors.
Figure 2

Run BeTwin software, click the "workstation configuration" menu, "workstation configuration" button, then select "add new workstation", enter the name of the workstation and determine, BeTwin will search system in all of the monitor, keyboard, mouse, game handle peripherals, and display all of the hosts and clients that hosts a default name is "HOST" (Figure 3).

Figure 3

Click the "hardware configuration" button, will all be reassigned hardware using the left button, move it to the "free hardware", the main distribution of the sound card, video card, video card, as well as mouse and keyboard, the allocation method is simple, to the sound card, for example, for example, to assign the PCI sound card "1" BeTwin workstation, as long as the selected PCI sound card device, and then use the right arrow button, the audio will be assigned to the "BeTwin workstation 1", in addition to the integrated sound is assigned to the "HOST," host using the same method to assign the video card, mouse, keyboard and other device.

Because BeTwin also supports four users, we may choose in the main interface BeTwin "add workstation" adding more users, but to ensure system stability and speed of work, it is recommended that two users sharing a single host, and the computer for more than two displays, light and a sound card is too much trouble, the successful implementation of a two-person BeTwin, and use two separate computers, do not interfere with each other, give full play to the PC must have the potential. Another powerful feature comparison BeTwin, users can press their need for reasonable setting.

Thursday, February 2, 2012

【 Weak current College 】 how to get rid of email viruses five tips



The first type, choose a reliable antivirus software

To deal with e-mail virus, in the message received the virus scanning filter harmful virus is a very effective means. The user can keep the anti-virus monitor feature in mail, setting the message monitoring feature, you can receive messages for viruses, effectively prevent e-mail virus invasion. Shenzhen Server lease

The second type, periodic upgrade virus library

In particular, the antivirus software vendor to upgrade service is very attentive to its software virus definitions are in constant update status, manufacturers will be according to a recent popular virus, the virus code at any time to update to virus library, if the user does not timely upgrades, it's hard to take on new virus killing, then you can't blame the antivirus software can't find viruses.

The third type, identifying e-mail virus

Some e-mail virus has a wide range of common characteristics that identify their common ground can prevent the destruction of a sector viruses. When you receive the message, look at the size of messages, if you find messages in the content, no attachments, the size of the message itself and dozens of K or greater, then the message may contain a virus, you can register directly from the computer, and then empty the waste Inbox; remember, the next step is very important, in the after emptying the waste Inbox, be sure to compress it again mailboxes, or antivirus software in the next virus checking also reported a virus; if you find a message you receive each other's address is unknown, the domain name on a very not like normal internal mailbox, it will most likely receive a virus, this time, you can also choose to delete directly. See attachment extension name, if it is a double suffixes so most likely is a virus, because e-mail virus will choose to hide in the attachment, you can directly book subject. Shenzhen Server lease

The fourth type, let mail monitoring function

Many users to purchase anti-virus software, because of some reason not open real-time monitoring of the firewall, because anti-virus software is running in some consuming system resources, but this is inevitable, it depends on how the regulation of the use of the user. If you do not open the real-time monitoring capabilities that will allow email viruses and other computer virus took advantage of the drill, not of the empty child protection measures in the presence of computer viruses with almost no ability to resist. Therefore, in order to secure protection of computers, a virus monitoring capabilities to run.

The fifth type, test

When faced with an attachment of the message, if the attachment is executable (*.exe, * .com) or a macro function in Word document, do not select open, you can use two methods to detect viruses. One way is to use antivirus software e-mail virus monitor feature to filter out virus in mail. Alternatively, the annex to the other exists on your hard disk, and then use anti-virus software to carry out virus checking.


Wednesday, February 1, 2012

【 Weak current College 】 data archive disk storage selection



Most enterprise database data flow in growth, but the lack of control, even cannot control, money, power and data center space are limited resources, the database on the utilization of these resources must be increased.

Supplier of many ways to improve the efficiency of data archiving solutions. Data reduction techniques such as compression, single instance storage (singleinstancestorage) and most powerful sub-file de-duplication technology, this enables suppliers to 30lbs data loading 10lb data archiving. When you are not using Spinningdisk, shut it down, regardless of vendor called MAID (Copan, Nexsan) or HDS, its the 1TB drive energy consumption from 7.5W reduced to less than 1W.

But even if these drives are stopped, the MAID system still consumes is greater than or equal to its normal run-time 30% more power, because in the low-load, low-power supply efficiency. The processor is in idle state still has the power consumption, but idling memory and an up-to-date level of idling server processor EnergyStar (consumption electricity to 55W), or not.

Data archiving storage of the simplest system, I call it locked NAS (lockedNAS). Vendors including NetApp and Sun company has expanded its file system and NAS operating system will remain in the implementation of the guarantor force add in. They are modelled on the NetApp SnapLock naming patterns, the latest improvement technology of date to the end of life equipment, playing on the "read-only" flag. Such a system would be in the life of the end-to-read-only portion of the reset.

LockedNAS general system, but lack the last time I mentioned a few other features.

While NetApp file compile stalls Member verification each have many cluttered information integrity of the data block, it does not operate in the background, in case any problems are found or remotely obtain a corrupt local data block of the full version. Scalability and long-term extension is a problem, because increasingthe drive as well as every 5-7 years data transfer (because your enterprise vendors maybe will no longer support your business system) and is not a good way to solve the problem.

Disk-based data storage archiving this market sector, another competitor is ContentAddressableStorage, using each storage destination (file, email information, etc.) of the hash as a storage target (instead of the file position) of important identifier — with NAS system. And usually thinking different, CAS systems do not use the full-text index as its location, but only a hash of the selected storage object. In fact, most CAS systems, including EMC Centera, Nexsan Corporation Assurion and Caringo CAStor, the company did not give its storage content indexing.

Their internal implementation of single instance storage (for example copy the same file multiple times will cause the same redundant data), or check the filehash, to consolidate data in the background. In addition to most of the file system supports name, owner, and time stamp, most CAS system can store extended metadata. As a result, the most complex application programming interface is used for file storage and recovery, data archiving software vendors to write and test the interface. SNIA standard XMLAPI--known as XAM, a year after the first appear in the CAS, and other fixed-content storage system.

CAS suppliers attach great importance to extend metadata. ILM (currently just a concept, not products) for data classification features, functionality, and similar e-discovery capabilities are required in addition to the name and date of other data to make decisions. I have doubts that need to store a special file system API. Data archiving software or a content management system is only able to add metadata and all important full text index into independent of the file system of the database.

Some vendors have built similar NAS device, using the hash to ensure that the integrity and identify the unique identity of the data, not as the main address of the target data. Like DataDomain company equipment and NEC's Hydrastor, have all been as a backup target, but its features, and data archiving device level. DataDomain unit for data preservation and removal, and the functionality the same. Permabit company EnterpriseArchive adopt similar hash to assist in the management of NAS data.

Many such systems with RAIN (redundant array of independent nodes) structure, so a 2U server into a 1u and built-in storage groups or the distribution grid support and management of data in the array. Some systems use absorption/fix nodes, these nodes can manage the hash data to and receive data while storage support data nodes. Some systems also have both features.

If you were able to complete implementation, RAIN patterns will make 100 nodes for scalability, new nodes are available to scalability, processor speed, disk capacity, and will increase a array, once placed in the old slow node or there is a problem with the data on the nodes will be resettled, then the old node will be replaced by a small number of hits or command. However, most of the RAIN system has an associated high speed processor, this can lead to an increase in power consumption, while at the same time might cause access times fewer large data archiving to consume too much.