Friday, April 2, 2010

Computer crash causes Daquan

sometimes run all the software are normal, but suddenly and inexplicably crash, reboot then run these applications perfectly normal, this is a kinds of false crash phenomenon. The reason there is a Win 98 multi-memory resource conflict. As we all know, software is running in memory, but you can close the application software free memory space. However, some application software due to design reasons, even after its closure can not be completely free memory, and present a piece of software to use this memory address, there will be conflict.

maintenance sections that have more and "the computer crashed because Daquan" related articles, for the introduction of this article or more, if you think this article is the wrong place, Or you have a unique perspective, you are welcome to express their views on computer knowledge and suggestions Forum. If you like computer knowledge, please keep in mind the only site domain name



with illegal format or parameters of the illegal opening or release of the program, will cause the computer to crash. Please note to remember the correct format and related parameters, do not attempt to remove and release are not familiar with procedures.

】 【non-normal turn off the computer



do not directly use the power button on the chassis, otherwise it will create the system file is corrupted or missing, causing auto-start or run in the crash. For Windows 98/2000/NT such systems, it is very important, serious, can cause system crashes.

】 【memory conflict









crash is to make the operator rather annoyance. Crash when the show more for the "blue screen" to start the system, the screen "freeze frame" no response, mouse, keyboard can not input, the software running non-normal interruption. Although the crash caused by many reasons, but the original aim, the reason can never escape from both the hardware and software.

by the hardware causes crash







as Windows 9x start to read System.ini, Win.ini, and the registry file, if it exists Config.sys, Autoexec.bat paper, these two documents will be read. As long as there is an error message that these files are possible crash, especially System.ini, Win.ini, User.dat, System.dat these four documents is particularly important.

【dynamic-link library files (DLL) is missing】



virus can dramatically decrease the efficiency of the computer, causing frequent crashes. At this point, we Xu Yong antivirus software, such as KV300, Kingsoft Internet Security, Rising, etc. to carry out a comprehensive check narcotics, anti-virus, and do regularly update anti-virus software.

】 【CMOS settings wrong







the better memory, hard disk capacity should be not less than 0.5 to 1%, if this problem occurs, you should replace the capacity to do memory may be large.

inferior parts】 【



excessive dust can cause the machine crash failures. Such as the floppy drive the laser head or excessive dust contamination, it will lead to read and write error, a serious cause computer crashes.

】 【device does not match





bad】 【cooling







should backup BIOS in case of emergency, but if your system BIOS upgrade needed, then before the upgrade make sure you are using the best BIOS version is consistent with your PC. If the BIOS upgrade does not correct the course of the upgrade or unexpected power outage, your system may not start. Therefore BIOS upgrade must be clarified before the BIOS model. If you are using the BIOS upgrade tool can backup the current BIOS, then put the disk in the previous copy of a BIOS. To see whether the system BIOS also supports recovery and also to know how to restore.

inappropriate】 【software upgrade









main hard drive is aging or because of improper use bad sectors, bad sectors. This machine runs very prone to crashes. Can use special tools to remove obstacles to treatment, such as serious damage can only replace a hard drive. Also for the motherboard does not support UDMA 66/100, should be noted that in the drive operating mode CMOS settings.

】 【CPU overclocking







the fault is common, such as hard disk parameter settings, mode settings, memory parameters set incorrectly which caused the computer not start. If no ECC function will be set to have ECC memory function, so it will cause crashes due to memory errors.

【system files accidentally deleted】



Computer crash causes Daquan


3D software and some special software, some computers may not start even on the installation, which may have hardware and software compatibility issues .

memory failure】 【



because they may be hidden virus software, once implemented, will automatically modify your system, the system crashes occur in the operation.

】 【application software flaws



If the remaining hard disk space too small, because some applications require large amounts of memory to run, so need virtual memory, and Virtual memory is provided by the hard disk, so the hard disk have enough free space to meet the needs of virtual memory. While the user still training regularly defragment your hard disk, remove junk files on your hard disk a good habit.

】 【BIOS upgrade failure





not to the directory where the software is installed directly delete the program, and if deleted, then the registry and the Windows directory, there will be a lot of rubbish in the course of time, systems also become unstable and cause crashes.

the use of pirated software】 【



infection】 【



This allows system resources exhausted, so that individual program needs of the data in memory or virtual memory can not be found, there will be exception error .

illegal operation】 【



in the Windows operating system there is a class file is also important, and this is the extension DLL The dynamic link library files, which file from the nature of the speaking class files are shared, that is, a DLL file may have multiple software at run time you need to call it. If we delete an application in time, the software installation program will be recorded against it had the documents installed and ready to delete them one by one, this time it is easy to appear to be deleted from the dynamic link library files also will be other software used in the case, if the missing-link library file is more important core linked documents, then the system will crash, or even collapse. We used tools such as "Super cyclamens" to remove unwanted DLL files, it will prevent from deletion.

【hard disk space is too little or too much debris】



move the process in the computer are often under great vibration device will loose inside the machine, resulting in poor contact, causing the computer crash, so should be avoided when the mobile computer severe vibration.

】 【dust killer





most people may think that the software upgrade is no problem, in fact, during the upgrade process will share some of the components of which were also upgrade, but other programs may not support the upgraded components leading to problems.

beta software】 【abuse







a small number of unscrupulous traders in a customer assembly compatible, the use of poor quality cards, memory, or even the sale of counterfeit motherboard and CPU off Remark , memory, this machine is very unstable in the run-time, inevitable crash occurred. Therefore, users should be wary of purchase, and can use some relatively new software testing tools for the computer, long continuous test machine (eg 72 hours), and the warranty for as long as possible time.

by the software causes crashes





such as motherboard and CPU frequency does not match the frequency, when the old motherboard overclocking FSB set too high, may not guarantee stability of operation , resulting in frequent crashes.

】 【hardware and software is not compatible



this situation is common, such as those running Win 98 DOS or Windows 3.1 to run a good 16-bit applications. Win 98 is 32, although it claims is compatible, but there are many places with 16-bit applications can not be coordinated. In other cases, as in Win 95, under normal use of the peripheral drivers, when the operating system upgrade, you may have problems, make the system crash or not start. In such cases the new drive should be to find peripherals.

】 【start up the program too much



needed because Windows 9x start Command.com, Io.sys, Msdos.sys and other documents, if they were damaged or accidentally deleted files even in the CMOS settings are correct in a variety of hardware did not help. Solution: use the same version of the operating system boot disk to start the computer, and then type "SYS C:\

destruction】 【initialization file









the best use of beta software, because software is usually tested with a number of BUG or in any way is not stable enough to use after data loss of procedural errors, crashes or the system can not start.

】 【illegal to uninstall software





display, power supply and CPU heat in the work of a very large, so good ventilation very important, if the monitor will lead to overheating color, image distortion or even shorten the display life. Long working hours can lead to poor power supply or monitor heat caused by the computer crashed. CPU cooling is related to the stability of computers running a major issue, but also thermal failure occurred "disastrous."

inappropriate】 【Mobile







is due to sound card or video card in the set of conflict, causing an unexpected error. In addition, other equipment interrupt, DMA or port conflict, then, may lead to the driver an exception, so that crash. The solution is to "safe mode" start, in the "Control Panel" → "System" → "Device Manager" in the appropriate adjustments. For an exception in driver error condition, you can modify the registry. Select "Run\key "to restart.

】 【memory capacity is not enough



overclocked CPU's operating frequency increases, while its performance may become unstable. The reason, CPU access to data in memory, already faster than the speed of memory and hard drive data exchange speed, overclocking to make this conflict more pronounced, increasing the virtual memory in memory or can not find the required data in the case, This will occur "exception error." Are relatively simple solution, of course, is to make the frequency of the CPU back to normal.

】 【hardware resource conflicts



main memory loose, Weld or memory chip itself due to the quality. Should be excluded under the specific circumstances of memory access fault, and if the quality of memory problems, you need to replace the memory to solve the problem.

】 【hard disk failure

Troubleshooting of the principles of the printer

general this situation is in place with a text editor, such as Word or WPS common and so obvious that the format in the preview neat, but the fonts to print out to find some overlap. This is generally due to improper editing settings, and its solution is a change of file "Page Properties" in the paper size, paper type, number of words per line, usually can be resolved.

2, print handwriting is not clear



general this happens, the system will usually prompt "Please check the printer is on-line and cable connection is normal." General reason may be that the printer power cord is not plugged; print cable is not connected properly; poor contact; computer parallel port, etc. damaged. Remind you that the solution has the following key:



1. If you can not start properly (that is, the power light is not lit), first check the printer's power cord is properly connected, in the off state the power cord to re- inserted again, and try for a power outlet to see whether the solution.

2. If you press the power switch the printer to print the normal start, on the BIOS settings, and then take a look into the parallel port settings. The general use of the ECP printer mode, but some printers do not support ECP mode, then used ECP + EPP, or "Normal" mode.

3. If the above two methods are ineffective, you need to focus on check printing cable, first turn off the computer, the printer cable re-inserted about 2 pull down, careful not to live swap. If the problem still can not solve it, try another printer cable, or alternative method.

5, print is not completely



Troubleshooting of the principles of the printer


this situation occurred in the laser printers are more likely to print a small file, or normal, but will crash when printing large files This problem is a software problem, you can view the remaining hard disk space, delete some useless files, or check the amount of memory the printer, whether expansion.

4, select the print after the printer does not respond



now printers have become the people's work and life often used in computer products, whereas the fact is frequently used products, so Ren Men often will Yudao this Huozhenayang Yixiewenti. Encountered a problem is not terrible, it is better to fast processing. Now I will brief you on some simple maintenance principles for your reference.

1, print and preview different







this problem usually is very common to use the printer, in general, this key and hardware failures encountered this problem generally should be noted that some of the key parts of the printer. We are here to inkjet printers in the example, the experience of fuzzy color printing products, fonts, the situation is not clear, you can lock in the nozzle failure, the first of the print head for automatic washing machine, if not successful than you can with a soft absorbent wipe the paper strong place near the print head; If the above method still can not resolve them, only to re-install the printer driver has.

3, can not print large files







If you encounter this problem, you can say for sure that is caused by a software failure, you can change the printer interface settings, choose "Start & rarr ; Settings → Control Panel → System → Device Manager → ports → Printer port driver → Change → Driver → Show all devices "will" ECP Printer Port "to" Printer port "confirm.

several methods mentioned above are all more common to use the printer on the fault, and indeed the failure to resolve the main printer or judge, as long as the reason to find fault, we can approach or by hardware Software repair methods. Of course, when people actually use the printer will encounter other problems, so this requires you to have more printer repair techniques.

fault repair the sections that have more and the "printer failure maintenance principles" related to the article, the introduction of this article or more, if you think this article is the wrong place, Or you have a unique perspective, you are welcome to express their views on computer knowledge and suggestions Forum.

Causes blue screen boot computer analysis and protection

1, first a blue screen error picture: you just copy from A disk or CD-ROM drive a file to your hard drive (note that this file can not be too small), the replication process will take out the floppy disk or CD-ROM, Windows will immediately Changing Faces - blue screen will appear immediately, then press Esc back to Windows status .

2, click the "Start" → "Run" dialog box that pops up, type msconfig.exe, carriage return, it will bring up the System Configuration Utility. Now, click on one of the "System.ini" tab.

3, find the [386Enh] key, click on "New" in their next add a string "MessageBackColor =" (Note that input without the quotes), enter an equal sign followed by 16 system number 0 ~ F, are free to fill in, which is used to indicate the error screen background color.

4, the same method, in [386Enh] next and then add a string "MessageTextColor =" (Note that input without the quotes), an equal sign followed by 16 hexadecimal numbers 0 ~ F, free to fill in, which is used to indicate the error screen the text color.

5, now restart your computer to be a test to see success is not: Repeat steps 1 and see whether they have bid farewell to a blue screen? You're done!

Note: This method and Windows does not really change the stability of fragile land, but through our work, change the Windows error screen when the background color and text color. From this perspective, it would be a kind of DIY act Oh.

fault repair the sections that have more and the "blue screen boot computer analysis of the causes and prevention," related articles, for the introduction of this article is relatively large. If you like computer knowledge, please keep in mind the only site domain name



"blue screen boot computer Analysis and Protection" is based on book knowledge, online information, practical experience summed up the article, if you want to know more of these questions, please repair the sections that concern more failures more articles!

often use the computer less friend must not run into a blue screen, goes on a cool blue face really annoying. Then the blue screen in the end is how it produced?

we can of soft and hard to explain both the blue for the cause. From the hardware side, overclocking over a major cause leading to blue screen. Over-overclocking, as a result of overloading operation, causing excessive internal operations to make cpu overheating, causing the system operator error. If both want to overclock, do not want to blue screen, and only do a good job cooling measures, and another powerful fan, plus some sort of cooling gel material will be much better. In addition, the amount of overclocking is overclocking or simply not one of the solution. To stabilize or to a higher speed depends on the choice of your own.

physical damage occurs if the memory of memory and other hardware are not compatible, also produced a blue screen. Solution at this time only for the memory that one of the ways.

If you look over, you will find read the disk drive when in the open can lead to non-normal blue screen. This issue does not affect the system working properly, as long as another bomb into the CD or press ESC key you can.

As hardware produced another common cause of blue screen is caused by hardware conflicts. Frequently encountered in practice is the sound card or video card settings conflict. In the "Control Panel" → "System" → "Device Manager" to check whether there is a yellow question mark or exclamation mark devices, such as there can try to simply delete it and restart the computer, Windows automatically adjusted by the general problem can be solved. If it does not work, can be adjusted manually or upgrade the appropriate driver.

poor quality parts is the computer blue screens of another culprit. A small number of unscrupulous traders in a customer assembly compatible, the use of poor quality motherboards, memory, and some even sell counterfeit motherboard and the old CPU, memory, this would make the machine run time is very unstable and crashes also occurred in the inevitable. Therefore, users should purchase a guard in this area, may request more familiar friends to help pick and can use some new tools for software testing than the computer, long continuous test machine (eg 72 hours), and for as long as possible warranty time.

from the software side, was a virus or hacker attacks, there is an error or damage the registry, boot loader too, version conflicts, caused by the virtual memory system of multi-tasking computing error, dynamic link library file is missing, too many font files, scheduled tasks loaded too many system resources or resource depletion conflict will have a blue screen. In addition, the hardware and software conflicts can easily generate a blue screen. Understand the blue screen appears "soft" reasons, you can remedy the.

eliminate the following blue screen of weird to see



Causes blue screen boot computer analysis and protection




Windows blue screen error when we may have been accustomed to this, but Can not "blue" screen for example, the "red" screen, "green" screen can not? course! as follows:

The main technical indicators of computer hard drives introduced

"computer hard drives introduced the major technical indicators" are based on book knowledge, online information, practical experience summed up the article, if you want to know more of these issues, please pay attention to the more computer Encyclopedia Forum article!

we usually buy in the hard disk, often hard to understand some of the parameters, and many magazine articles have also been a lot of explanation. However, in many cases, this description is not detailed or even a bit misleading. Today, we chat about this topic, hoping to buy the hard drive to provide proper assistance.

First of all, let's look at the internal structure of the hard disk, it will help to understand the relevant content of this article.

work, the disk in the axial motor driven, high-speed rotation, the head arm in the voice coil motor control, carried out in the disk at the top of the movement to address radial



The main technical indicators of computer hard drives introduced


1, RPM (RPM, Revolutions Per Minute): This indicator represents the hard disk spindle motor (disk drive) speed, on behalf of such 5400RPM The hard drive spindle speed of 5400 rpm.

2, Average Seek Time (Average Seek Time): If there are no special instructions generally refers to the tracking time of reading, in units of ms (milliseconds). This indicator is the meaning of receiving the hard disk read / write instruction to the heads move to the designated track (should be cylindrical, but it is the track for the specific head) above the average time needed. In addition to the average seek time, there are Road between Seek Time (Track to Track or Cylinder Switch Time) and full seek time (Full Track or Full Stroke), the former refers to the top of the head to move from the current track over the adjacent track time, which means the head from the outside (or the most inner) loop inside track at the top to move the most (or most things) the time required to circle above the track, basically more than double the average seek time. For practical work, we generally only care about the average seek time.

3, the average incubation period (Average Latency): This indicator is moving to a specific track when the head after the long wait the specified read / write head moves to the bottom sector (the disc is rotation), the disc turn faster, shorter incubation period. The average incubation period is used in a half circle of the disk rotation time. Obviously, the same speed, the average incubation period of the hard disk is fixed. 7200RPM when about 4.167ms, 5400RPM when about 5.556ms.

4, the average access time (Average Access Time): also known as the average access time, usually published in the manufacturers specifications will not be provided, which generally results in a test, its meaning is from the read / write commands sent to the first data read / write when the average time used, including the average seek time, average latency of the House and related operating time (such as instruction processing), since the House action for a very short (typically In 0.2ms or so), can be neglected, the average access time can be approximately equal to the average seek time + average latency, which is also called the average seek time. If a 5400RPM hard drive, the average seek time is 9ms, then in theory it's the average access time is 14.556ms.

5, the data transfer rate (DTR, Data Transfer Rate): units of MB / s (megabytes per second, also known as MBPS) or Mbits / s (megabits per second, also known as Mbps) . DTR is divided into the maximum (Maximum) and continuous (Sustained) two indicators, the data transfer is divided in different parties external and internal data transfer rate. DTR is the head and the internal buffer data transfer rate between the external DTR is the buffer zone and the host (ie, memory) between the data transfer rate. DTR limit depends on the external hard disk interface, the popular Ultra ATA-100 interface, which represents the maximum theoretical value of the external DTR up to 100MB / s, sustained DTR DTR is continuing to look at the internal level. DTR is the hard drive inside the real data transmission capacity, for the full play within the DTR, external DTR DTR theoretical values are higher than the internal, external, internal DTR determine the actual performance of DTR. As the disk tracks the most outer ring up, can head the unit of time more than the inner ring of the track across sectors, so head in the most outer ring within DTR when the largest, in the most inner ring within DTR when the minimum.

6, the buffer capacity (Buffer Size): Many people have called the cache (Cache) capacity, unit MB. Information in a number of manufacturers have also been writing Cache Buffer. The basic role of a buffer to balance the internal and external DTR. In order to reduce the waiting time host, will read the data before the hard disk into the buffer, so fill up before all the read or the buffer to send to the host interface to speed quickly. As technology advances, manufacturers are then added for the SCSI hard disk buffer cache functionality (which is why I still insist that it is the reason for the buffer). This is mainly reflected in three areas: prefetching (Prefetch), experiments show that in typical cases, at least 50% of the read operation is a continuous read. Prefetch function is simply the hard drive "without permission" to expand the scope to read, send to the host specified in the buffer sector data (ie, read head has been designated sector), the head and then read a number of adjacent fan data into the buffer zone, if the latter point has just read the adjacent sector prefetch, read from the buffer without re-addressing the head, increased access speed. Write Cache (Write Cache), usually in the write operation, data is first written to the buffer and then sent to the head, so head to write the report after completion of host write is completed, the host began to deal with the next task. Hard disk with write cache data is written to ease in the area after the report is written to the host has finished, let the host ahead of time to "liberate" other matters (the rest of the host need not wait for the write heads), to improve the overall efficiency. To further improve performance, manufacturers now have applied the basic sub-caching technology (Multiple Segment Cache), the buffer is divided into multiple small pieces and write data stored in different, but do not waste the buffer zone for small data space, It also can be so unified after all paragraphs written, write, better performance. Read cache (Read Cache), will read the data off temporarily stored in the buffer, if necessary, the host can once again directly from the buffer provided speed. Reading also can make use of sub-cache technology, store multiple disparate data blocks, the cache read data more than to further improve the cache hit rate.

PC Forum in Wikipedia for more and "hard disk introduces the major technical indicators" related to the article, the introduction of this article is relatively large. If you like computer knowledge, please keep in mind the only site domain name



Hard common technical indicators are the following:

msvcirt.dll document analysis, download and prompt solution to the lack of msvcirt.dll


sometimes because some of the illegal software and Trojan reasons, will the system directory msvcirt.dll file damaged or deleted, leading to play games or use the software when prompted to lack msvcirt.dll file (xp sp3 prompted the lack of msvcirt . dll xpsp3, vista tips lack msvcirt.dll vista).


solution:



DLL Name: Microsoft C Runtime Library



"msvcirt.dll document analysis, downloads, and tips lack msvcirt.dll solution" is based on book knowledge, online information, practical experience summed up the article, if you want to know more of these issues, please pay attention maintenance sections that more articles!

msvcirt.dll What is this? Suggest a lack of msvcirt.dll xpsp3 or msvcirt.dll vista or msvcirt.dll xpsp2 how to do? Can not find msvcirt.dll file, msvcirt.dll location, msvcirt.dll What is the folder path? This to 11 to answer them and provide msvcirt.dll download (msvcirt.dll xpsp3 download or msvcirt.dll vista download or msvcirt.dll xp download can be resolved).


msvcirt.dll document analysis









security level (0-5): 0



common error: File Not Found, Missing File, Exception Errors



DLL files: msvcirt or msvcirt. dll




Method three: the second method, some users will be prompted that the directory has been msvcirt folder, if there is the prompt, Go to the system directory "C: \ WINDOWS \ system32" to find a "msvcirt" named folder, delete it, then the implementation of method 2 step.

msvcirt.dll versions Download: http://download.wxiu.com/zjbb/system/200908/03-6215.html



Description:



Spyware: No



system DLL file: No





maintenance sections that have more more and "msvcirt.dll document analysis, downloads, and tips lack msvcirt.dll solutions" related to the article, the introduction of this article is relatively large. If you like computer knowledge, please keep in mind the only site domain name









msvcirt.dll document analysis, download and prompt solution to the lack of msvcirt.dll










msvcirt.dll is the Microsoft C programming language runtime relevant documents, for example, to print.

are: Windows





Adware: No






msvcirt - msvcirt.dll - DLL file information








Method 1: Start - Run - enter "rmdir / s / q% systemroot% \ system32 \ msvcirt.dll" press Enter.


Method 2: The first method used to restore the user does not need to download according to their own system, the corresponding "msvcirt.dll" replace the files, such as the xp-sp3 user to download & ldquo ; msvcirt.dll_xpsp3 \; next, put away after the run game can



suggest a lack of msvcirt.dll

Thursday, April 1, 2010

Worm virus spread Win32.Looked.BA Introduction

virus security view includes more and the "worm virus Win32.Looked.BA disseminate information" related articles, for this introduction to the article is still relatively large number of, if you think this article is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum.



1. Do not e-mail attachments to run freely, especially in English e-mail.



Win32.Looked.BA worm features











worm infected files Win32.Looked.BA is a kind of worm, spread via network shares. It could also generate a DLL file used to periodically download and run arbitrary files. This will seriously damage the worm, he can steal all your system passwords to your system, causing immeasurable loss. Article Jiuji brief you Win32.Looked.BA infected with the worm theory, as well as preventive measures:







run-time, Win32.Looked.BA copied to the% Windows% \ Logo1_.exe and% Windows% \ rundl132.exe, then run the% Windows% \ rundl132.exe.





popularity: China



"wxiu.com" prompts us



3. proposed enterprise-level users Gateway products.



Win32.Looked.BA worm Description

Win32.Looked.BA is a kind of worm infected files, spread through the network share. It could also generate a DLL file used to periodically download and run arbitrary files.



attention to the timely closure of useless shared directory, such as the need to share, should be set share permissions. For the system account, should be set relatively strong password, you can avoid viruses easily guess the password function scored system.





4. Close shared directory and set a strong password for the administrator account, do not set the administrator password is empty or too simple passwords.



not arbitrarily run the exe file.



against Win32.Looked.BA worm recommended



Virus Name: Win32.Looked.BA < / p>

crazy: Low



Worm virus spread Win32.Looked.BA Introduction


destructive: China









2. The best time to upgrade the virus code base.

Computer virus was the correct approach to

application skills view includes more and "computer virus in the correct approach" related articles, for this introduction to the article is still relatively large number of, if you think this article is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum. If you like to learn computer knowledge, please keep in mind the only site domain name





Internet, the movement of a variety of the virus in the non-stop, as a computer connected to the network, even though we have done a variety of precautions, but still can not be avoided, would have got a little inattentive. And now we have learned mostly how to prevent poisoning the computer knowledge, but who already poisoned the computer how to deal with is poorly understood. Here we will brief you on poisoning emergency measures.

one, do not restart
Generally speaking, when you find that unusual process of unknown program is running, or the computer is running significantly slower pace, and even the regular IE asked whether to run some ActiveX controls, debugging scripts and so on. Well, this time that this time you may have poisoned.
poisoning many people feel that the first thing to do first thing is to restart the computer. In fact, this is extremely wrong. When your computer after poisoning, if the restart, then the most likely result in greater losses.

2, Li-urgent disconnected from the network
because the virus attacks, not only to slow down the computer, but also destroy the data on the hard disk, but also may be send out your personal information, viruses, etc., so that further harm. In this regard, was found poisoned, the first thing to do is disconnect the network.
methods are more disconnected from the network, the simplest way is to go to a computer behind the allocation of the net line, which is the most simply way. However, in practical applications, we do not need such trouble, after all, went to the computer behind it is quite annoying of God. If you install a firewall, the firewall can be disconnected from the network directly, without a firewall, you can right-click "My Network Places" icon in the pop-up menu, select "Properties\; Local Area Connection "and will set it to" Disable "option. If it is dial-up users, you only need to disconnect the dial-up connection or the device can be shut down Moden.

3, back up important files
poisoning is not to conduct an immediate anti-virus, I personally feel that if the computer is not important document, then does not matter how operations are , up to I formatted the hard disk completely re-install. However, if the computer in the preservation of important data, mail, documents, you should be disconnected from the network immediately after its backup to other devices, such as mobile hard disk, CD-ROM. Despite efforts to back up these files may contain viruses, but antivirus software to check narcotics than will be removed much better.
What's more, after the virus attack is likely to not enter the system, so back up important files a timely manner after poisoning is to reduce the loss of one of the most important way.







Computer virus was the correct approach to


4, comprehensive anti-virus
In the absence of a worry, we can carry out the killing of the virus. Killing should include two parts, one in the Windows system under a comprehensive anti-virus, and second, under the antivirus in the DOS. At present, the mainstream anti-virus software in general can be directly under DOS antivirus disk production. In the anti-virus, it is recommended the user first, the need for antivirus software settings. Such as scanning compressed package files, scanning e-mail, while handling the file that contains the virus, for example, it can be set to "clear the virus," or "isolation" rather than a direct "Delete Files" This was done to prevent important documents were removed because of misuse.

5, change the key information set
due to viruses, Trojan horses are often in order to steal personal information for the purpose of the user, thus carrying out a comprehensive anti-virus operation must be followed by some important personal information, such as QQ, Email account password reset. Especially after the killing found a Trojan horse, especially the need for this work.

6, check the My Network Places
If it is LAN user, in dealing with their own computer virus, but also check whether other computers on the network, also was infected with a virus. Because many viruses will attack after the other computers to the network to launch attacks. Their own computer virus is most likely to infect other computers on the network. If you do not timely manner of its liquidation, then the most likely to re-reverse transmission.
check method on each computer in addition to a comprehensive virus removal, you can also install a firewall such viruses Jinshan net dart, if there are other computers on the network with a virus, then the virus will not stop the firewall to block attacks , we only need to open their interception logs, which can be an IP address that sent the virus database, according to re-identify the IP address of computer, in accordance with the above-mentioned methods can be handled.

Computer Beginners should follow the principle of anti-virus

First, the concept of establishing the right of anti-virus, learning about the virus and anti-virus knowledge.















10 are generally not to use the floppy disk to start. If the computer from the hard disk, do not use floppy disks, because it is caused by infection of the hard disk boot sector virus.



Computer Beginners should follow the principle of anti-virus


2 is not easily download the software online. In particular, not to those from unknown web site to download free software, because they can not guarantee that the software had not been infected.



Third, do not use pirated software.



13 is to rebuild the hard disk partition, to reduce losses. If the hard drive information has been damaged, do not rush to format, because the virus can not be in a short time destroy all the hard data, it can make use of "reconstruction" process analysis and reconstruction.





7 is regularly make backups. To cultivate the habit of backing up important files.



8 is to produce a non-toxic system floppy disk. Production of a non-toxic system disk, be write-protected and properly maintained so that emergency.







5 is to use the new equipment and new software prior to inspection.







12 is the discovery of suspicious circumstances and timely information for assistance.



now the computer is a part of people's lives, whether at work or a pastime, most can not do without computers, but computer viruses is also our greatest headache. At home, playing games, surfing the Internet, send and receive e-mail are likely to become infected. Readers may want to ask a friend, then how can we make your computer from viruses, or to minimize loss to, under normal circumstances, I recommend that readers follow the following principles friends before they occur. To minimize the dangers of computer viruses.





6 is the use of anti-virus software. Time to upgrade anti-virus software for the library, open the virus real-time monitoring.



9 is to produce an emergency disk / rescue disk / recovery disk. In accordance with the requirements of anti-virus software, create an emergency disk / rescue disk / recovery disk, in order to restore the system Ji Yong. In the emergency disk / rescue disk / recovery disk to store important information about the system data, such as the hard disk master boot sector information, the boot sector information, CMOS device information, etc., as well as DOS system, COMMAND.COM and two hidden files.



Fourth, it should not use someone else's floppy disk or CD-ROM. Special plate special plane as far as possible.





11 is the attention to the computer with no abnormal symptoms.







virus security view includes more and "computer beginners should follow the principle of anti-virus," related articles, for this introduction to the article is still relatively large number of, if you think of this article there is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum.

National Computer Center found that U disk killer virus, new variant of

According to the experts advise, have been infected with the variant of the computer users should immediately upgrade the system in the anti-virus software, to conduct a comprehensive anti-virus. Is not infected with the variant of the computer users need to open the system, anti-virus software "system monitor" feature, from the registry, system processes, memory, network and other aspects of the various operations to active defense, so you can monitor the first time unknown virus invasion of activities to achieve full protection of computer system security purposes.



In addition, subscribers use a mobile hard disk, U disk medium such as a good idea to anti-virus. At the same time, it is best to disable the automatic playback system, prevent the virus from the use of U disk, mobile hard disk, MP3 and other mobile storage devices invasion of infected computer's operating system.





virus security view includes more and the "National Computer Center found that U disk killer virus, new variant of" related articles, for the introduction of this article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name



National Computer Center found that U disk killer virus, new variant of






the same time, an infected variant would modify the relevant registry key entry system, leading to the operating system can not properly display system hidden files, display the executable file extensions, or even to prohibit the system burner software , media player software and running processes such as Bluetooth devices.



experts say that in addition to the succession of earlier variants of the worm through the U disk and other removable storage devices, communication and other characteristics, he also has a stronger self-protection and some other new features. Variant running, it will copy itself onto the infected computer's operating system under the system directory, and multiple folders in the directory to generate a different executable virus file. Variants also create a "system Recycle Bin" folder attributes and its own copy of the copy into it and hide.



In addition, the variants will continue with the infected system to the root directory of all disk partitions write variants of the main program files and configuration files, once a computer user clicks on any drive letter, it will start to run the variant. This variant will also start by modifying the system registry entries, allowing variants with the computer system which automatically starts to run.





China National Computer Virus Emergency Response Center to monitor the Internet through the discovery, the recent worms "U disk killer" new variant, to remind users to take precautions.

Wednesday, March 31, 2010

RM file, the Trojan how to do

RM file, the Trojan how to do?

51 during the overcrowded everywhere, I still chooses to stay home to spend not less than seven days is not long holiday, in fact, and I have a lot of people have the same arrangement, such as Jia Jia MM is the case. In order to alleviate the pressure of work some time ago, and she intends to stay quietly at home which did not go, prepare for and survive with a variety of large, are so-called "517 days music, at home happy."
51 just two days, on the third day woke up early in the morning, I suddenly received a MM Jia Jia calls for help. "East-yu brother, I would like to give you something to discuss at noon today I ask you to eat right? "This sentence makes lying in bed, I thought I was dreaming, and even pinch a few of their own. "Is Hong Menyan! Need to know before I invite her to dinner, have refused to compliment to the place, today actually invited me to dinner, there must be some demand for me. "Right on cue, at dinner time, Jia Jia, MM said he might have fallen into the system, Trojan horses and let him help us to see.
eating mouth is short, there is no way home after dinner I went to MM. Having carefully reviewed the process of the system and found a suspicious "iexplore.exe" process. "This is not IE browser, do the process, I do not run ah, how does such a process? "My heart has thrown doubt," It seems that your system must be in some kind of Trojan horses, IE browser, it is called. "
" In addition to these days, I downloaded three movies, nothing to download ah! "MM says. So I have three films, it was discovered Unexpectedly, which has some strange link. Trojan appears to be in a web page, this simple, find the page, then solve the problem, clear out the system in the Trojan horse.
"to see several of his films will be in the Trojan horse? "Jia Jia MM asked, puzzled. "You do not say that only RealPlayer player, users will do in the Trojan horse? I use MPC, but ah, how has the Trojans out? "I had to explain:" In the past, only RealPlayer player, can be in the web page Trojans, but now the invasion of ways with each passing day is simply impossible to defend ah. Today, just empty, so you can show off, to see how the intruder RM file to add malicious code. , "done all that as soon as hands-on demonstration to the MM.
reproduce RM Trojan Hoax
"As the RM file is the most commonly used on the network, one of the multimedia file types, so this way the spread of Trojan Web page that allows users face even more endangered Wide . In fact, this method was first used in communication networks advertising, but now has been an intruder used, and to the general RM files to your page links to Trojan operations are not complicated, with some ready-made tools can be completed, such as Helix Producer Plus, RealMedia Editor. "I give an introduction to the MM.
"First of all to prepare a RM video file as a Trojan the spread of pages of raw materials, the best there are some attractive elements, or the victim would not have to watch the Trojan is triggered that time period. There is also an advantage is that, when a user relish the time to watch movies is not going to care about the pop-up pages. "I have to add a bit.
I first open the Notepad program, create a text file, enter the following in the above section of code, and then save it as mm.txt:
u 00:00:20.0 00:00:30.0 & & ; _rpexternal & & http://www.cpcw.com/test.htm
me explain the meaning of this code. Where u is the event flags (Flag), said to be inserted in the document is a URL address. Then the third field represents the starting and ending point in time, the unit format is "hours: minutes: seconds. Ms\Open the URL, rather than using the default browser to open Realplayer embedded URL. Here that when the players to the first 20 seconds or to drag the playback progress of the first 20-30 seconds, when at any time between, RM files will automatically call the system default browser to open "http://www.cpcw.com/ test.htm "link to this page, which will install Trojan programs to the user's system.
Then I run the RM video files, editing tools RealMedia Editor, click on "File" menu under "Open the Real Media file" command to open a previously prepared that part of the normal RM video files, and then click the & ldquo ; Tools "menu under the" merger event "command, select the text file that you just saved. Finally, click "File" menu under the "RealMedia File Save As" command, it would be saved as a new RM file, so that a Trojan horse to bring the web page document produced by RM.

for MM Weapon
For this malicious RM files to prevent, different situations can be used in different ways. For those who can download to your hard drive in the RM file, we can be called a "Real media filter" software on the suspicious RM file handling, which may contain some of the web links and special effects plus removal of out. Run "Real media filter" in the "source document" and "Save As" option to the appropriate settings, and then click "Start Filtering" button you can remove the suspicious RM file redundant links (Figure 2). Filtration is complete, the program will pop up a dialog box and prompts filter content.
In addition, if the user using MPC to play, you can decode the Real media file type is set to DirectShow can be, since the use of DirectShow format can be automatically screened out these ads. But since RM file is the company's exclusive Real format, so DirectShow format for some special RM files can not be decoded. Then only use the RealMedia format player, but the ads feature will automatically shield failure.
finally reminded lovely MM, in time to the Microsoft website to download the latest security patches to plug the loopholes in the system and software; install the latest anti-virus software and update virus database; install the network firewall, blocking does not require port, and the process of trying to connect to the Internet to conduct careful screening.

Hackers attacked the remote to send data, so that frequent computer crashes, then how to solve

Hackers attacked the remote to send data, so that frequent computer crashes, then how to solve?

A: The approach is: immediately disconnect the network. For dial-up Internet users, to immediately stop hackers offline connection; while LAN users, as long connected to the Internet, always liable to be attacked, the general should install personal firewall, just click the firewall " disconnected from the network "button, you can connect immediately stop hackers.

while off the network, should immediately press the "Ctrl + Alt + Del" key combination to check whether the system is running any suspicious process, once found, they should immediately stop it.
then they need to run antivirus software to remove. To prevent virus attacks, many users have installed on your computer anti-virus software, as long as the time to upgrade, these anti-virus software can remove most of the existing Trojan.

MP3 face threat how to do

MP3 face threat how to do

today's digital products is becoming increasingly popular, which will gradually attract more attention of virus writers, and perhaps pass on all elated songs are also infected with many viruses, the virus develop good habits if the virus would not be crazy spread.

we use the MP3 player in the process, it is often necessary to MP3 and computer connections after the file copy, this MP3 player is very prone to virus infections, we should from the following aspects years for prevention.

1. Open the write-protect switch

If the MP3 player with a write-protect switch, and do not write files to the device, preferably in front of the computer connected to the write-protect open switch, so cut off from the source of virus transmission.

2. Install anti-virus software for mobile

now more well-known antivirus manufacturers have introduced specifically for MP3, flash memory and mobile hard drives used in mobile devices such as antivirus software. Of course, mobile anti-virus software installed, we must promptly update the virus database, so as to provide against possible trouble.

3. to manually change the contents of the directory

If your MP3 player, there is no write-protect switch, but also there is no mobile version of antivirus software, then there is a relatively simple way to prevent the virus from invasion. MP3 player in the root directory of the following tools for manually via Notepad to create a name for the "Autorun.inf" file, so a number of viruses in the future will not be able to go to the root directory of the following MP3 player automatically generated "Autorun.inf" file, and can not carry out the illegal distribution of MP3 players. Similarly, the anti-virus method is also applicable for mobile hard disk. This method can prevent the majority of low-level viruses, but if you encounter high-level hackers write viruses, then the application of other methods antivirus.

4. a virus then the application-specific software to format

Even these measures, and sometimes can not be completely avoided infection MP3 phenomenon. Our MP3 infected with virus how to do? Then we must note that in the absence of virus before treatment, do not connect the MP3 to a different computer to use, because that may cause cross-infection, the spread of the virus to further expand the scope of .

at this time we have to do is to format the MP3 player deal, in the format of the process, paying particular attention to choose the correct file format. In addition to the extent possible use of the supplied formatting program (usually a random CD or a manufacturer's official Web site are provided), or may occur after the MP3 format can not be normal use issues.

virus security view includes more and "MP3 encountered threat how to do" related articles, for this introduction to the article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name

How do I remove Radmin Trojan

How do I remove Radmin Trojan

network security can not be ignored, believe it or let you hit. Recent Radmin Trojan on the network itinerant criminal madness. If we start by cleaning up the registry key approach to deal with it if it is not able to successfully removed. Because Radmin items through the service to start, and the highly covert. If you are not familiar with the system service, really could not challenge. But then the cunning fox is also able to escape a hunter's eyes. Here we take a look at the anti-crime from Hunan pioneer boat is how to clear cunning Radmin Trojan horse.

to describe the situation
the computer mouse pointer slide for no reason, such as by others in operation. And some more computer software programs, which actually also broadband account viewer. Computers also sometimes automatically restart, or will be closed. At the end of Internet access fees paid to the 电疑营业厅 found that the use of more inexplicable ChinaVnet spending bills online, but I do not have to purchase through Telecom ChinaVnet anything 呀.
ferret out behind
Under these circumstances, my first impression is that in the gray pigeons Trojan. Who called gray pigeons "notorious" mean? Subsequently, prompt action to upgrade anti-virus software, a comprehensive system scan. But in the long process of killing nothing. So I decided in accordance with the "computer reported" vanguard of the anti-crime methods described in manual strangulation gray pigeons, but found not in the gray pigeons Trojan.
really can not be reconciled, I am not it Gaobu Ding a small "horse"? I do not despair, and a careful investigation and system processes and found a suspicious process r_server.exe, found that the process consumes less memory, but the computer in the event of failure that I have described, they suddenly increased, showing that a back door program. End it immediately, and open the registry at HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run to find the location of the value of suspicious loads.
But let my disappointment, did not r_server.exe loaded value, Is it uses what is the latest high-tech? I am thinking all at once broken. So I decided to open a "Command Prompt" type "netstat-an" to see the computer used for all connections with the ports, I found an illegal occupation of 4899 port, and saw the remote control of my IP天址. This time Louchumajiao of.

eliminate Radmin evil "horse"
According to all the signs, online view, I guess I am in the Radmin Trojan. Radmin Trojan's default port is 4899, and the use of Radmin Trojan different from the ordinary run load value, and the Trojan antivirus software, previously considered to be "innocent person" because of its original role is to help network management for remote operation . However, abuse by hackers to others in the illegal invasion, anti-virus software, it also had "thrown down the killer."
I open the Registry Editor, use the process name r_server.exe as a keyword Trojan scan quickly search to the relevant key, I accidentally click to open the "Display Name" key changes to items found in numerical data for "Remote Administrator Service\
here I have a clear way of working Radmin Trojan, and it is not through the run key to load, but through the "service" to load. Know that work like handled. I opened the service items, turn into the "Control Panel → Administrative Tools → Services\Trojan and some of the main program directory will delete DLL files, and then the primary key Radmin deleted, Radmin was thus dispels.

In this case, we can see a computer intruder in the rowboat on the kinds of Trojans, the stolen boat broadband account through ChinaVnet of consumption, this is a despicable, while this is Crime! Ah Liang here to remind you that if the demand for services do not use ChinaVnet, the best online shopping to the offices are closed function to prevent a loss.
Radmin Trojan uses easy for everyone to ignore the service mode to start Trojans, an increase of all anti-crime problems. But then again, and then can not escape the cunning fox hunter's eyes. As long as Trojan horses, are usually occupied by the port system, as long as we have found have been illegally occupied by the port, and then follow it back, we can find a way to clear the Trojans.
finally prompted you to close the redundant services not only enables the system performance can also be added to the system a certain extent, the safety factor. If we require the services of the system are not familiar with, can make use of super-rabbits optimization software, in its start-optimization of the system can be set to start the service. Must not arbitrarily shut down their service, or may lead to system crashes.

Tuesday, March 30, 2010

6700.cn the virus to bind browser home problem-solving approach

6700.cn the virus to bind browser home problem-solving approach

browser is a malicious virus binding site www.6700.cn the home page, page can not be restored, how to solve? 6700.cn the virus hijack the browser, how to remove 6700.cn virus, 6700.cn modify your browser home page, 6700.cn clear way what is? See this article Xiang Jie.


1.6700.cn cleared the first step: Delete the following files into the Safe Mode


c: \ windows \ dyulty \ spoolsv.vbe

< p>
c: \ windows \ system32 \ sdfi \ spool.vbs


c: \ windows \ system32 \ yttl.sys


c: \ windows \ system32 \ \ drivers \ \ wbstgt00.sys


c: \ windows \ system32 \ drivers \ apaidi.sys


c: \ windows \ system32 \ drivers \ qeiq.sys

2.6700.cn Clear Step two: Remove the restart after the repair the following:


start-up projects - start running regedit registry remove the following entries:


[360tray]


[360safe]


start-up projects - service - start to run msconfig the driver of the Disable the following items:


[YTTL / YTTL] <\?? \ C: \ WINDOWS \ system32 \ yttl.sys>


[wbstgt00 / wbstgt00] <\ SystemRoot \ system32 \ \ drivers \ \ wbstgt00.sys>


[plkgos / plkgos] <\?? \ C: \ DOCUME ~ 1 \ ADMINI ~ 1 \ LOCALS ~ 1 \ Temp \ plkgosfoc>


[Apaidi / Apaidi] < ; \?? \ C: \ WINDOWS \ system32 \ drivers \ Apaidi.sys>


[agrs / agrs] <\ SystemRoot \ system32 \ drivers \ qeiq . sys>


3.6700.cn Clear Step three: do not trust the security guards of then 360 fixes IE, repair services, management boot entry.


4.6700.cn clear finish: Modify Home for their own site you want.

virus security view includes more and "6700.cn virus to bind browser home problem-solving method" related articles, for this introduction to the article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name

What means to save you, my drug tyrants

What means to save you, my drug tyrants
Kingsoft you for the loyal players attention, we not encountered a virus firewall or drug tyrants Web Firewall, firewall, not open chat situation. Should we do anything like it? No, let a few of you next dedicated to drug tyrants, "revived" OF THE CHEATS.
1. to re-start the firewall (Note: only for Windows 2000/Windows XP)
in the "Start → Run\firewalls; Run "C: \ kav6 \ kavsvc" / install, then restart the firewall should be no problem.
2. restart the firewall and chat website
off drug overlord firewall program, run Regsvr32 "C: \ kav6 \ KAIEPlus.DLL\
3. for Kingsoft V, just to the path kav6 replaced kav5 on it.
4. For Windows 9X/Me, make sure that kavsvc9x.exe to random start. Starts group inside KAVSvc9X.exe.
Note: The above path only for the default installation path, if your installation path is D: \ Program Files \ Kingsoft \ KAV6, then the corresponding run the command should be "D: \ Program Files \ Kingsoft \ KAV6 \ kavsvc "/ uninstall.

Monday, March 29, 2010

Digital Cameras Input language skills

Digital Cameras Input language skills

with a digital camera for fast text entry, it is very simple and is made into a photo spread into the computer, and then recognition software to convert plain text file format can be.


Whenever your boss throw a thick stack of files, so you are typing a word for word the computer, do you feel is not going to collapse? Have you ever thought, a digital camera you can make it better and more economical to "typist"?


Today, digital cameras have large numbers into ordinary homes. For ordinary users, the use of digital cameras to shoot photos, it is only right and proper thing. However, with digital cameras to input text, I am afraid that most people in the eyes of a little fantasy. Now, let's first look at the Du Men capacity unique skills - with digital cameras to input the text of the real "Kung Fu Hustle."


shooting


with a 300-million or more pixels, more than 3 times optical zoom digital camera that filmed the original manuscript. When shooting should note: the manuscript should be flat, the camera should end flat, light to gentle uniform. Can scatter light in the corridor or window, the three primary colors can also be taken under fluorescent lamp eye protection.


taken correctly identify clearly the key to the later, 300 million or more pixels can guarantee for identification after shooting the text is large enough; 3 times optical zoom when shooting so that the manuscript in each of lines covered the screen. I have been comparing the 300-megapixel shot than shooting with 2 million pixels recognition rate is significantly higher.


Do not use flash, light is too strong, shot down but the writing is not clear.



conversion


in the computer's hard drive to create a folder, the photographed images into one. However, these images contrast is very small, the entire screen is gray; and a variety of digital camera image format is different, OCR software (OCR software) may not be able to support, so we are advised to use ACDSee or Windows built-in "Paint & rdquo ; program conversion.


writer is a Windows comes with the "Paint" program to convert the. First, the order click on "Paint → File → Open" in the "Look In" to find the pictures, open and click "Save As" in the "Save as type" Select " monochrome bitmap. "


Click "Save\Converted obtained new pictures follow the original name, changing the extension to ". Bmp\


identification


run OCR software (which can be downloaded from the Internet, the author uses Tsinghua TH-OCR2000 Millennium Professional Edition), then click "File → Open" in the "Look" and find your pictures. Click on "order" drop-down menu appears, if the need for full recognition, you can click on "all recognition\The upper part of the software window after shooting, the converted original image, the lower part of the text is identified. Recognition followed automatically created after the original name of the txt file, saved in the original file folder.


If only identify part of the text, press and hold the left mouse button in the need to identify parts of the text pulled out the box, there a yellow block, click on "identification" can be.


finishing


created at the beginning of the file folder to find the extension txt plain text file file, this is the information needed for identifying the wrong word to modify, especially in the text emphasis added and underlined text recognition rate is still relatively low. At the same time in the file folder, there are many extensions chr, trc, sim files, which are generated when OCR recognition temporary files can be deleted.


application skills view includes more and "digital cameras, text entry techniques" related to the article, for the first capacity in this area is still quite a lot of articles, if you think this article is the wrong place, or Do you have a unique insight, you are welcome to express their views to the computer knowledge and recommendations of the Forum. If you like to learn computer knowledge, please keep in mind the only site domain name

CMOS settings change from time to time to achieve the computer boot _153

CMOS settings change from time to time to achieve the computer boot

we all know, computers can regularly shut down, shut down the program by calling the windows from time to time, or from time to time off software can be achieved. But the timing is not so simple boot must be particularly aware of the CMOS settings, through the CMOS settings from time to time the boot, then boot from time to time how the set up it? I give you to be a specific answer.



Timer-Power set-up steps:


the first to enter "CMOS SETUP" program (most of the motherboard is the computer starts, press the DEL key to enter); and then be moved to the light "Power Management Setup" option, enter into its sub-menu; and then "Resume by Alarm" item is set to "Enabled\2, ... ...), the "Time (hh: mm: ss) Alarm" item to set the boot time; finally save the settings, restart, when the closure of the computer, your computer will be provided in your time of auto - Start.


have to pay attention to the points


1. Your computer motherboard must have a "Resume by Alarm" function can be achieved from time to time the boot;


2. to achieve the computer boot from time to time, we must cancel windows Power-on password;


3. connected to the host power supply.


application skills, and view includes more "CMOS settings to change from time to time to achieve the computer boot" related articles, for the first capacity in this area is still quite a lot of articles, if you think this article is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum. If you like to learn computer knowledge, please keep in mind the only site domain name

The long-term damage to the hard drive of six commonly used software

The long-term damage to the hard drive of six commonly used software

long-term damage to the hard drive of six commonly used software


hard drive is the most important computer storage media, on the hard disk maintenance, I believe that every computer user has to understand. However, there was a lot of articles are aimed at single user dial-up era, the increasing popularity of broadband and large hard drives continue to lower prices today, many people will open up our computers so that the hard disk running at full capacity: see high-clear DVDRip films, carried out without interruption The BT download, use Windows System Restore feature in ... ...



However, you may not be aware that these new software applications to bring new models will bring new damage to the hard disk! New application model of the potential threat



1. Frequent defragging



Disk Defragmenter, and System Restore was originally provided by the normal function of Windows, but if you frequently do this manipulation is detrimental to the hard drive of. Defrag the hard disk to the bottom of the analysis, to determine what data can be moved, what data can not be moved, and then sort of archival classification. The formal arrangements for hard disk data structure before it continued to random read write data to the other clusters, line up the order and then move the data back to the appropriate location, such manipulation would occupy a lot of CPU and disk resources.



Indeed, right now in terms of a large hard drives, documents, and e-mail the space occupied by a very small percentage, most people buy a large hard disk is used to hold movies and music, these partitions no need frequent order - because of the effect of playing multimedia files and the disk structure does not really matter, play speed is determined by the video card and CPU.



2. Windows XP's automatic restart



Windows XP automatic restart feature that automatically closed the process of non-response to automatically withdraw the illegal manipulation of the program, thereby reducing the user's manipulation of the steps. However, this feature is also a very big issue: it will automatically re-start before the closure of the hard disk power supply, when you restart the machine and then open the hard disk power! As a result, the hard disk in less than 10 seconds time interval by the current two shocks, it may occur all of a sudden "death" failures. In order to save some energy set to let the system automatically closed to the hard disk, the hard drive is also more harm than good.



3. Coding errors DVDRip



Now online transcripts from the DVD video format, compressed DVDRip very popular. This version of the movie clearly is almost the same degree and DVD, but downloading a movie is only 700MB ~ 1.3GB size, so many users like to format DVDRip movie downloaded to your hard drive slowly to enjoy. However, play this format film have high requirements for the system: In addition to CPU, graphics cards require robust enough to ensure smooth playback, the disk load is also very large - due to play DVDRip is a constant decoding decompression, and then conveying to the display system process.





I found that there are coding errors encountered DVDRip files, Windows will appear very high occupancy rate of the disk phenomenon: the system continually want to bring into encoded video signal, but the coding error in the file index and the corresponding signal segment is not match the - and this time, the hard disk constantly flickering lantern, the whole system very slow to respond to user manipulation, a user clicks on the menu but almost no response. If coding errors are more, the system will sometimes crash. Many users are very impatient at this point, directly press the RESET button on the chassis and even the direct closure of the computer power supply, hard disk head is not properly reset the case, this manipulation is very dangerous!





Tip: Windows XP users who require special attention, when we preview some of Windows XP automatically larger ASF, WMV and other files, of course, there is no formal play, but it can also occur suddenly slow computer speed, hard drive lights constantly flicker phenomenon, its ringleader ringleader is still wrong encoding video files!



4. Bittorrent download



Bittorrent Download the emerging broadband era model of P2P exchange of files, all users share resources with each other when the seed and relay stations, commonly known as BT download. Because each user's download and upload is almost at the same time, so download very quickly. However, it will download data directly written into the hard drive (unlike FlashGet download tools such as cache can be adjusted to the specified amount of data written to disk before), so the occupancy rate of the hard drive is much greater than the FTP to download! " br />




In addition, BT download in advance to apply for hard disk space, at a time when downloading larger files, generally there will be 2 to 3 minutes for the entire system have all been the priority task of the space occupied by other tasks very slow response. Some people in order to take full advantage of the bandwidth, but also a few BT download tasks at the same time, this time is very easy to avoid high occupancy rate due to a disk crash caused by failures.





Therefore, unless your computer's hardware configuration is very high (especially the memory, at least in the 256MB and above), or to make improvements prior to the BT download, and if lengthy, multi-tasking to download applications, best traditional FTP software.



5. PQMAGIC the risk of conversion



PQMAGIC is the famous Partition Magic, can not destroy the data in the case of free to adjust the partition size and format. However, PQMAGIC recently launched, the general user's hard drive also 2GB, while the now 60 ~ 80GB hard drive is already everywhere, PQMAGIC already powerless: the adjustment with the data, 5 GB or more of the partitions, usually require a more than an hour!



In addition to factors outside the capacity, PQMAGIC adjust the hard disk partition, a lot of time is spent checking the data and testing the hard disk, it can be seen, in this case, "non-destructive partition" is very difficult to guarantee: As the conversion speed is very slow, time-consuming and too long, the conversion process of readjustment, it is easy because of computer power outages, crashes and other factors result in data loss. Such losses are usually one or several partitions is lost, or the capacity to become abnormal, serious and even cause the entire hard drive can not read the data.



6. The hard disk protection software anomaly caused by



Easily be caused by hard disk abnormalities, as well as the hard disk protection software. For example, "Restore Wizard\At this point thinking about install and uninstall the "Restore Wizard\This failure is due to the "Restore Wizard" took over the INT13 interrupt control system in the control of the hard drive before the boot, using FDISK / MBR command can not be solved.





This is just the software have been failures, but many of them inexperienced, out of the subject will find a variety of partitioning tool "test\/ "

QQ software, using the tips of four

QQ software, using the tips of four

"using the QQ software, four tips" is based on book knowledge, on-line information, the actual manipulation of the article summed up the experience, if you want to know more of these topics, please pay attention to practical application of view includes more many articles!


now playing QQ pay attention to a word "cool." So, while there are a lot of tips here, even our selection, we will first offer four.


1. Quickly transfer files quickly if you want to send the file to your friends, first of all be found in the local disk you want to send the file, drag it to QQ in your friend's nickname on the hover a moment, at this time will automatically open with you QQ Friends of the chat window, and then he submitted the request to send the file.


2. Group members recognize the true face of a lot of times we do not have additive group of some members of friends, if this guy that frequent changes to his nickname, to distinguish him in the end is a Who really is trouble. QQ 2004 provides a "group of business card" feature, if the friend set up business cards, we can by right-clicking its nickname, choose "View data\status at a glance the.



3. Refused to base the picture information QQ 2004 promised to everyone in the group using 从定义表情 and send screen shots, if your network more slowly, which will take up a lot of bandwidth, it is that we can by clicking the group in the toolbar's " current legislation banning receive picture "to remove the trouble.


4. Bulletin of harassment we reject ads using the QQ in the process of positive numbers often receive from the mobile phone text message 10000 Tencent harassment, right? In the QQ 2004, we can switch to the "phone friend" window, the numbers can be pulled blacklist.


application skills view includes more and "use QQ software, four small skills" related articles, for the first capacity in this respect the article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name

Clear your system 3721

Clear your system 3721

1. Delete the 3721 files to install the location of the file is stored by default in the C drive C: \ Windows \ Downloaded Program Files \

C: \ Windows \ (this directory there are a Cns *. dat files)

C: \ Windows \ System32 \ Drivers \

C: \ Program Files \ 3721 \ 2. Delete the 3721 registry garbage in the registry HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run item the next there is a CsnMin registered ------" Rundll32.exe C : \ Windows \ downlo ~ 1 \ CnsMin.dll, Rundll32 ".

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ Enum \ Root \ LEGACY_CNSMINKP

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ Services \ CnsMinKP

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet003 \ Enum \ Root \ LEGACY_CNSMINKP

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet003 \ Services \ CnsMinKP

HKEY_USERS \ S-1-5-21-1708537768-1303643608-725345543-500 \ Software \ Microsoft \ Internet Explorer \ MenuExt \ Quick Search (Yisou.com)

Hope that through the above efforts, you have after an absence of 3721 brings you trouble