|
Close Windows files protection function method | Hits:3 |
In the registry editor, found in the HKEY_LOCAL_MACHINE \ \ \ Microsoft SOFTWARE WindowsNT \ CurrentVersion \ Winlogon, will SFCDisable key value modified as FFFFFF9D , if need to reactivate the function, resetting to 0 . Note that the... | 11/16/2010 |
Let your hard disk material stealth small method | Hits:3 |
In everyday we surf the net computer hard disk has many important or nondisclosure privacy or documents, such as private photos or customer data what! When the Internet you can easily be hacker filch you of these documents, want to solve... | 11/15/2010 |
How to attentively complete content and the chain | Hits:3 |
From having one xinzhan till now imperceptible also about fast for more than six months, the website can go up in the optimization of its important arises-whether webmaster friends, can have a good rankings for web traffic is of profound... | 11/13/2010 |
Adsense adding outside chain of common method | Hits:2 |
A, soft text links This method is I think that the most effective means for submitting to some general similar to A5 or CZ website, in the article, keep your links. But don't in the article deliberately advertise, it would give... | 11/11/2010 |
XP and Win7 LAN Shared set the solution of the problem | Hits:1 |
Win7 system network functions than XP has been further enhanced, use rise also relatively clear. But as a result of many surfaces, make optimized working at the bottom of the network Settings for accustomed to XP system people become... | 11/10/2010 |
How to prevent the wireless network by hackers counterplan | Hits:1 |
For our user community, this how to prevent network hackers powerful invasion? Here is to 3Com company as an example, and see how they are for network defense. How the user can reduce or even eliminate hacking into the Wi - Fi or 802... | 11/09/2010 |
Prevent royal technology is introduced | Hits:2 |
LingTian attack can ruin a network. They will for application of developers unknown or haven't developed corresponding patch vulnerabilities make attacks. Hackers can use these leaks into your network code execution, and even obtain full... | 11/08/2010 |
Prevent rogue administrator method | Hits:1 |
For the company, it is one of the biggest threat leakage sensitive data - such as customer or employee payment or personal identity information, etc. These data may sometimes be internal employees have stolen. This kind of circumstance, by... | 11/06/2010 |
How to ensure enterprise FTP safe | Hits:1 |
The FTP is mainly used to transport large files, it is for the purpose of design. The FTP is a client-server (master-slave mode) agreement, it USES control and data two channels transferring files. Control channel to carry on... | 11/05/2010 |
Web tampered processing skills | Hits:2 |
Yesterday, a friend told me that he's web page is always , by changing the IE www.baidu.com front page or modifying registry, they were unable to other page as the home page, wants me to help him well. To solve the problem I googled many... | 11/04/2010 |
WINDOWS system remote desktop connections method highlights | Hits:2 |
1, remote desktop profile When a computer opens the remote desktop connections function after we can at the other end of the network control this computer, through remote desktop functionality we can real-time operating the computer,... | 11/03/2010 |
Server security and permissions Settings | Hits:2 |
A, system installation 1, according to Windows2003 installation CD's prompted to install, by default IIS6.0 2003 didn't put to install the system inside. 2, IIS6.0 installation The start menu - control panel - add or remove programs --... | 11/02/2010 |
How to prevent SEO attack | Hits:2 |
Method one: by hackers technical compromised opponent website Someone will ask: your opponent when fool ah, conquer the somebody else website the somebody else will not know? Well, as long as SEO hatchet man is not compromised web site... | 11/01/2010 |
Windows 7 cleaning the system of rubbish skills | Hits:1 |
A garbage, folders are (assumption Windows installed in disk C, as in other partition replace letters can) 1, my documents garbage, enshrined in the C: \ Windows \ before she folder, 2, installation procedures, edited documents produced by... | 10/30/2010 |
Affects starting velocity causes and solutions | Hits:1 |
Beginners can also operate let WindowsXP accelerate powered up a computer and its relevant external equipment to hand, it hardware entity fixed, and this time can operate only software program, this article from the hardware and software... | 10/29/2010 |
|