| Back to logs list
Reprinted from alumni of the user at 21:59 on March 25, 2010 Reading (loading. ..) Comments (0) Category: Personal Diary
If you are using a windows2k or xp then teach you a trick withdraw its role?? and requires only that the computer never let the virus move! !
; rain tears. You are welcome】 【QQ1124111263
If you is the newly installed system (or you can be sure your system is currently non-toxic), it could not be better, if not make sure your computer has not toxic, it is best to reinstall the system, it will open immediately :
\
The first is the super administrator password to change into more than ten digits, then create a user,
pandora bracelets sale, it also set a password more than ten, and promoted to super administrator. The aim is to double insurance: If you forget one password, and password to login with another super-pipe to restore the room, lest you be refused on the outside the system; addition of online hackers can not guess the super password of your system by means of remote control access to your system and do damage control. Then add two users, such as user names are: user1, user2; and specify the user group they belong to, well, prepare to be completed here, and after the addition to the necessary maintenance of your computer should not be used outside the super administrator and user2 landed. User1 can only log out.
after landing, when the Internet to find ie, for it creates a shortcut to the desktop, right click the shortcut and select \Points to the Internet when the shortcut, it will tell you when to use user name and password that you enter a user name and password user2! ! ! Well, now you can use this open window to the Internet, you can rest assured that as you have to browse to any vicious, malicious, websites with web pages, without having to worry about in the move it! Because the activities of your current system user user1. And user2 is not active user, we use this non-active users to the Internet, no matter how clever the site, the information obtained through ie it will be thought that the user2 is your current activity of the user, if it is to When you visit malicious code using the system for you, then engage in sabotage when simply does not work,
pandora online, even if the can do it through, then be modified only when the use2 out of a configuration file fills, and many of malicious code and viruses trying to user2 they are nothing but destruction activities will fail, because user2 did not even run, how can we get the operating system, right? ? If not taken, it had no alternative but to you. They also can not cross the user to operate, because Microsoft had originally Calvary user configuration are independent, just as people can not take my family to go to sleep with my bed, they are unable to occupy the user1 position! So you always As long as the agent of this user2 users to the Internet (but do not use user2 to login, because that case, what if the user2 previous page in the virus, then landed in the user2 same time, they most likely be activated!), then no matter how many pages you are the virus, all will be unable to run or load your current user1 users, so you will always be non-toxic current system!
However, when the total negligence, a careless poisoning, how to do? ?
Do not worry,
pandora uk, now we can enjoy the performance since the shelling of the technology,
pandora bracelets!
start withdraw its role:
restart the computer, use the super administrator login?? what is the procedure after entering the system are not running
you will be surprised to find that even in the performance of the system completely non-toxic! ,
pandora charm! , Better yet, now immediately open:
\
the inside two users user1 and user2 right to delete it, you only need to delete such a lightly on it, then the previous two users exist with the virus just like with it the disappearance of two users go to sleep out?? (seems to be buried with the dead, Ha ha!). Done this then I guarantee that your newly installed win2k as a kind, any system files and system processes which completely is not the virus!
good! Now repeat the steps starting from the newly created two users user1 and user2 to enable them to revive it. They resurrection is the resurrection, but the virus had followed them the opportunity but it is not, because when win2k to re-establish the user will be re-assigned to their new configuration, and this configuration is also impossible to include a new virus ! ! ! Written off immediately after the establishment of a super administrator to complete, transfer, such as use of user1 login and continue to do you like it,
pandora sale, you will find out your system as new! Cycle of the above methods can be used, along with Microsoft's patches play often, almost always guarantee that your operating system is non-toxic state! As long as you follow the following rules and regulations rut:
First, any time not to super administrator login?? Unless you want to update and maintain the system level, need to use the time as an administrator or super- you need to add and delete user time.
Second, you must use the super administrator login when not in use and operation to ensure that any addition to the operating system comes with tools and procedures for anything other than, and all maintenance only option through the Start menu to complete, and even use Explorer to browse the hard drive is not! Only do users and system management and maintenance to exit immediately, but do not stay! (This is also the request of Microsoft, and Microsoft know their stuff, his advice was correct. Browse the hard disk of matter, under the other user you have a lot of opportunities in the super-administrator or not the next! ! This should be done in the matter completely.)Welcome to the rain tears ..】 【QQ1124111263