Your are here:hacking technology > network management > Article list

Close Windows files protection function methodHits:3
In the registry editor, found in the HKEY_LOCAL_MACHINE \ \ \ Microsoft SOFTWARE WindowsNT \ CurrentVersion \ Winlogon, will SFCDisable key value modified as FFFFFF9D , if need to reactivate the function, resetting to 0 . Note that the...11/16/2010
Let your hard disk material stealth small methodHits:3
In everyday we surf the net computer hard disk has many important or nondisclosure privacy or documents, such as private photos or customer data what! When the Internet you can easily be hacker filch you of these documents, want to solve...11/15/2010
How to attentively complete content and the chainHits:3
From having one xinzhan till now imperceptible also about fast for more than six months, the website can go up in the optimization of its important arises-whether webmaster friends, can have a good rankings for web traffic is of profound...11/13/2010
Adsense adding outside chain of common methodHits:2
A, soft text links This method is I think that the most effective means for submitting to some general similar to A5 or CZ website, in the article, keep your links. But don't in the article deliberately advertise, it would give...11/11/2010
XP and Win7 LAN Shared set the solution of the problemHits:1
Win7 system network functions than XP has been further enhanced, use rise also relatively clear. But as a result of many surfaces, make optimized working at the bottom of the network Settings for accustomed to XP system people become...11/10/2010
How to prevent the wireless network by hackers counterplanHits:1
For our user community, this how to prevent network hackers powerful invasion? Here is to 3Com company as an example, and see how they are for network defense. How the user can reduce or even eliminate hacking into the Wi - Fi or 802...11/09/2010
Prevent royal technology is introducedHits:2
LingTian attack can ruin a network. They will for application of developers unknown or haven't developed corresponding patch vulnerabilities make attacks. Hackers can use these leaks into your network code execution, and even obtain full...11/08/2010
Prevent rogue administrator methodHits:1
For the company, it is one of the biggest threat leakage sensitive data - such as customer or employee payment or personal identity information, etc. These data may sometimes be internal employees have stolen. This kind of circumstance, by...11/06/2010
How to ensure enterprise FTP safeHits:1
The FTP is mainly used to transport large files, it is for the purpose of design. The FTP is a client-server (master-slave mode) agreement, it USES control and data two channels transferring files. Control channel to carry on...11/05/2010
Web tampered processing skillsHits:2
Yesterday, a friend told me that he's web page is always , by changing the IE www.baidu.com front page or modifying registry, they were unable to other page as the home page, wants me to help him well. To solve the problem I googled many...11/04/2010
WINDOWS system remote desktop connections method highlightsHits:2
1, remote desktop profile When a computer opens the remote desktop connections function after we can at the other end of the network control this computer, through remote desktop functionality we can real-time operating the computer,...11/03/2010
Server security and permissions SettingsHits:2
A, system installation 1, according to Windows2003 installation CD's prompted to install, by default IIS6.0 2003 didn't put to install the system inside. 2, IIS6.0 installation The start menu - control panel - add or remove programs --...11/02/2010
How to prevent SEO attackHits:2
Method one: by hackers technical compromised opponent website Someone will ask: your opponent when fool ah, conquer the somebody else website the somebody else will not know? Well, as long as SEO hatchet man is not compromised web site...11/01/2010
Windows 7 cleaning the system of rubbish skillsHits:1
A garbage, folders are (assumption Windows installed in disk C, as in other partition replace letters can) 1, my documents garbage, enshrined in the C: \ Windows \ before she folder, 2, installation procedures, edited documents produced by...10/30/2010
Affects starting velocity causes and solutionsHits:1
Beginners can also operate let WindowsXP accelerate powered up a computer and its relevant external equipment to hand, it hardware entity fixed, and this time can operate only software program, this article from the hardware and software...10/29/2010

Home  <<Prev  2   3   4   5   6   7   8   9   10   11   12  Next>>  Last

Current Page:7 , Total 29 Pages, Every Page 15 Records, Total Records: 432

Hot Articles
Recommend Articles
New Articles
Sub category