Magic Hacker Archive

Chapter 10: Network Ghost Qu Bin (3)

Views:

In addition, these things in some people's systems are also very important and cannot be deleted and modified casually. Since it can't be modified or deleted, wouldn't it be possible to let the system become bloated and aging to death every day.

In fact, we can also perform a "transplant operation" on the system, remove the registry information and record files that seem to be annoying but can't be removed from the system and put them on the non-system disk. In addition, install all the application software on the non-system disk, so that your C disk only installs one system, which is completely liberated.

The method is also very simple, just download a virtual pocket creation system. The pocket creation system PrayayaV3 is actually a "green mini window creation system" which is a virtual window creation system.

It can be implemented in any non-window system partition including U disk, mobile hard disk, external hard disk, mp3, mp4, card and other mobile devices to install a large number of applications. This system is very small, only a few megabytes in size, and will not take up a lot of disk space.

To achieve the "system migration" I mentioned above, just install the V3 system on your computer's non-system disk.

Then install all the software in this pocket system to use, especially those that write a lot of registry files, such as office software series, and chat and communication software like Internet phones.

Because their chat history is saved under My Documents in the system disk by default, the browser can also be installed.

Because its folders and network records are stored in the system disk. Suppose we install a V3 pocket as a system on the D drive of the non-system disk.

Then install all the software I mentioned above into this system, so that the registry file will not be written on your system disk.

Instead, it is written under the V3 system of the D drive, including the folder network history, chat history, and Internet phone records. Mail will no longer be saved in the C drive. The upgrade will be the same in the future, and it will not harass the C drive.

This is equivalent to sharing the pressure of the system, allowing it to be completely liberated, and focusing on being the commander-in-chief behind the scenes. No longer have to worry about the system becoming bloated and aging day by day.

Use system cleaning tool optimization master, Super Magic Rabbit is a system optimization cleaning tool that everyone uses.

There are many similar tools on the Internet. I believe that many people are more proficient in using them. However, they are all measures to treat the symptoms but not the root cause. I will not introduce them in detail here.

In fact, developing a good usage habit and cherishing your computer a lot is the panacea that keeps the system youthful forever.

I hope you will find something after reading the text above. Don’t move, just reinstall the system and restore with one key. It might be as simple as smashing the mouse, smashing the keyboard, and finally crashing the system.

Qu Bin quickly settled this.

But Mengmeng is envious to death. Just listen to Mengmeng said; thank you! In the evening I invite you and your friends to a light meal, you are not allowed to come.

Qu Bin's father! It should be said that it is Qu Yibi, it should be said that it is a father, it should be said that it is a friend, because Qu Bin is now their brother, especially to a traveler who knows everything but just can't say it.

Qu Yi and they asked "Hey!" Brother, did my girlfriend come today

Qu Bin replied immediately; here, I will go to Neng La, everything is done, but your girlfriend said to invite us all out for dinner at night, but I don't want to go.

At this moment someone knocked on the door, and Qu Yi went to open the door immediately, faster than anyone else. The opening of the door looked really baffled.

Qu Yi is about to give you a hug, tell Mengmeng to push it away immediately, and smile and say regardless of Qu; I know you are back, what kind of cooks did your brothers give you today

Qu Yi said right away; how can the instructor leave us a computer computer forever without poison

We discussed for an afternoon but found that it was not feasible. Mengmen scratched his head and said; the instructor is also a real computer, and no one can do anything about how to avoid the virus. The stations don't think much about it now, let's go eat first.

When we finished speaking, we had to pull Qubin's hand and listened to the song. We were not in the mood to go. If we can't figure out this question from the instructor, we won't eat.

Just listen to Mengmeng's words; the nine of you are also true. You don't have to be a genius when guarding the computer. It's just an ancient hidden weapon, Biao. Qu Yi patted his thigh and grabbed Qu Bin's hand and said: Brother, what can you do.

Just listen to Qu Bin; this matter is easy to handle, listen to it, let me tell you that if you are using Windows 2000 or a processor.

Then teach you a trick to evacuate the cicada, and only need this trick to make your computer virus-free forever!

If you are a newly installed system, that would be great.

If you are not sure whether your computer is poisonous, it is best to reinstall the system first and open it now: "Start→Programs→Administrative Tools→Computer Management→Local Users and Groups→Users"

Qu Bin went on to say that the first thing is to change the super administrator password to more than ten digits, and then create a user, set its password to more than ten digits and promote it to the super administrator.

The purpose of this is to double insurance: if you forget one of the passwords.

There is still room for using another super password to log in to save it, so that you will not be rejected from the system; in addition, online hackers can no longer remotely gain control of your system by guessing your system super password and destroy it. . Then add two more users.

For example, the user names are: interactive users, network users: and specify that they belong to the user group, well, the preparation work is now complete.

In the future, except for the necessary maintenance of the computer, do not use the super administrator and user login. Just use the user login.

After logging in, when you go online, find IE, create a shortcut for it to the desktop, and right-click the shortcut.

Select "Run as other user" and click OK! Click this shortcut when you want to surf the Internet, and it will ask you for a username and password. At this time, you enter the username and password of user2

Well, now you can use this opened window to go online, and you can browse any vicious, malicious, websites and webpages without worrying about being tricked anymore! Because your current system active user is user1.

The user is an inactive user. When we use this inactive user to go online, no matter how smart the website is, the information obtained through instructions will make it think that this user is your current active user.

If it wants to use malicious code to damage your system while you are browsing, it simply won't work.

Even if it works, the modified configuration file is only a configuration file that is used at the time, and many malicious codes and viruses that attempt to destroy the user through the user will fail.

Because the user is not running at all, how can we get the right to operate the system? ? Since you can't get it, there is nothing to do with you.

And they are even less likely to do it across users, because Microsoft's configuration is inherently independent between users.

Just like it is impossible for others to come to my house and occupy the bed I use to sleep, they cannot occupy the user's position!

So as long as you can ensure that you always use this user as a proxy to access the Internet.

Because if that's the case, if the user has had any web viruses before, they are very likely to be activated when the user logs in!

So no matter how many web viruses you have, all of them will not be able to run or be loaded by your current users.

So your current system will never be poisonous! But when there is always negligence, what should I do if one accidentally gets poisoned

Don’t worry, now I’m here to perform the golden cicada's evacuation technique, Qu Bin said while doing this golden cicada's evacuation technique on the computer.

Just see Qu Bin restart the computer and log in with the super administrator-do not run any programs after entering the system.

You will be surprised to find that the system is completely non-toxic. Now please open it immediately: "Start→Programs→Administrative Tools→Computer Management→Local Users and Groups→Users" Delete user rights.

You only need to delete it so gently, then the virus that used to exist with these two users will go to sleep together with the disappearance of these two users.

After doing so, make sure that your computer is like a newly installed one, and any system files and system processes are completely virus-free!

Just listen to Qu Bin; now repeat the beginning steps to create a new user and account name, let them resurrect.

Their resurrection is resurrected, but the virus that has followed them does not have this opportunity, because when the user is re-established, they will be reassigned to a new configuration.

And this configuration is brand new and it is impossible to contain a virus. Log out of the super administrator immediately after the establishment is completed, switch to using user login, and continue what you seem to do.

You will find that your system is as brand new! The above method can be used over and over again, plus regular patching of Microsoft, you can almost always guarantee that your operating system is in a non-toxic state!

As long as you can follow the following rules: Do not log in to the system as a super administrator at any time-unless you want to perform system-level and maintenance, when you need to use a super administrator, or when you need to add and delete users .

When you must use the super administrator to log in, ensure that you do not use and run anything other than the tools and programs that come with the system.

And all maintenance is done only through the options in the start menu, not even using the Explorer to browse the hard drive!

Just do the management and maintenance of users and systems and exit immediately, and never stay too much!

That's it, Qu Bin shocked everyone again.

I listened to the song and said; we really benefited a lot from what you said, so let's go to dinner, and everyone will go to dinner happily.

In the restaurant, this Mengmeng just sat with Qu Bin for a while while holding dishes and then toasting. He was very embarrassed to make Qu Bin.

But there is no other way but to accept it. This meal can be said that Qu Bin is very unhappy that he has something to say in his heart, let alone that I am your son. If it were really like that of yours, you might have slapped your mouth long ago.

Qu Bin glanced at Qu Yi and saw that his face was very unsightly, sour, but sour could not call someone else.

"Hey!"

But what about the future? After a few days, Qu Bin wondered what way I had to go back. I don't want to be uncomfortable in this world in this parent's world.

Especially my mother seemed to be a little bit interested in myself, and I didn't dare to commit a crime of disrespect.

"Hey!"

Naive will be jokes, people traveling through time and space are either princes or generals, or some historical figures in history.

Or the family of someone in history, but what about yourself? It just happened to have crossed into the time of his parents and became a brother with his father.

Becoming friends with my mother is really ridiculous. If this is known to others, it won’t be ridiculous. It's really helpless.

The most hateful thing is that I have to go to the best Internet company in the world, but I just cross it.

"Hey!"

It's really joy and sorrow, what am I celebrating? It’s fine if you don’t drink this wine, or you won’t be able to cross. These things won't happen.