1, install Win2K free serial number
Method 1: In the process of installing the Windows2000, you want to enter the registration number during the process of installing the Windows 2000. In order to make the installation more convenient, you need to enter the registration number during the installation process. Copy the installation file to the hard disk, open the setupp.ini under the i386 directory, change the number behind the PID to 51837270, then you will ask you to enter the serial number again during the entire installation process. Method 2: After all of the contents are all deleted, then rewrite the following information: [PID] PID = "42144270" EXTRADATA = 62706A776C7766637274CE52597B39 -------------------------------------------------------------------------------------------------------------------------------- ------------------------ 2, using the command line format installed with the answer file
Use the floppy disk to start using WinNT.exe to implement an unrecognized installation: winnt.exe /u: D: / i386 / t: C: Enter the operating system, use Winnt32.exe installation new system implementation When the installation is installed: Winnt32.exe /u: d: / i386 / tempDrive: C: Using the CD-ROM startup unrecognized installation: a, create a reply file to name Winnt.sif And put its related files into a floppy disk or engrave the file into the i386 directory in the installation CD of Windows 2000 / XP. b, start the computer with a 2000 CD to implement an automatic installation process without answering. The floppy disk is automatically called in the floppy disk or the response file in the CD I386 Winnt.SIF.
/ syspart: drive_letter indicates that you can copy the installation boot file to a hard drive and mark the hard disk as an activity, and then install the disk on other computers. When the computer is started, it will automatically start the next phase of the installation. However, you must always use the / tempDrive parameter and / syspart parameter. On the computer running Windows NT 4.0, Windows 2000 or Windows XP, you can use the / syspart option to start Winnt32. The computer running Windows 95, Windows 98 or Windows ME cannot use this option. This parameter can only be valid when running Winnt32.exe.
Special key name and function:
Key Name: Repartition key value: Yes | No Specifies whether to restrict and format the client first primary disc (formatted as NTFS system). This is only valid when using the Windows 2000 CD to start a computer for unattended installation.
Key Name: ExtendoemPartition key value: 0 | 1 Allow installation to establish expansion partition -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------- 3, how to maintain system files in Windows2000
If Windows 2000 reports that your system file is replaced or deleted? This is a problem that will appear from time to time, you can recover from the system file protection program in Windows 2000. In Windows 2000, SFC command pair Maintaining the entire system file is useful. The specific approach is: In the "Start" / "Run", enter "SFC / ScanNow" to scan the system file and fix it. The SFC command statement is as follows: sfc [/ scannow] [/ scan "[/ scanboot] [/ cazcel] [/ enable] [/ purgecache] [/ cachesize = x] [/ quiet]. Where: / scannow immediately scans all protected system files. / scanon scans all protected system files once. / ScanBoot Scans all protected system files each time you start. / Cancel cancels the scan of all suspended protected system files. / enable enables Windows file protection for normal operation. / PurgeCache Clears the file cache and immediately scans all protected system files. / cachesize = x Set the file cache size. / Quiet does not prompt users to replace all incorrect file versions. You can choose to use these commands as needed. -------------------------------------------------- -------------- 4, Wonderful environment variables in Windows 2000
Installing the Windows 2000 Professional version, the C drive is still installed in WinodWS 98, while WinodWS 2000 is installed on the E disk (the application is installed under Windows 98). Try to open some software without installation, find that Visual FoxPro 6, VC , WPS 2000 and other software can be used directly, WinziP8.0 and other software enter the registration number, Photoshop and other software open, pop up a series The dialog box shows the following information: The following dynamic link library PfPick cannot be found. DLL and the formulated path: D / program files / adobe / photoshop5.0cs / winnt / system32 / winnt / system / winnt / winnt / system32 / wbem, but all the way to click "OK", can still be opened. Can you not let these dialogs appear? This involves the environment variable settings for Windows 2000. Although Windows 98 also has environmental variables in the registry, but there is no easy modification of Windows 2000. Analyze the contents of the above dialogs, the first is the software installation path, the rest is the system directory, the last one is the path setting of the environment variable. Then look up the dynamic link library file PFPICK. The DLL location is found in the system directory. Thus, open the control panel, double-click System, select Environment Variables in "Advanced", you can see two dialogs, "User Variables" above, set up a temporary variable, used to store temporary files The following is "System Variable", set some system parameters, we need to modify this "path" path here, write:% systemroot% / system32% systemroot%% systemroot% / system32 / wbem We only need In the back, add some statements: "C / Windows C / Windows / System C / Windows / System32", then restart your computer, double click Photoshp5.0c. When Exe, you will find that there is no previous dialog box listed. Later, some other software, like ACDSEE, Foxmail, OICQ, SoniQue, Jet-Audio, etc. can also be used directly, Dreamweaver, Firework, Flash4, Cumeftp Enter the registration code, and Netants will pop up the dialog box, display "MSIPCSV.EXE unable to locate the program, input point getProcessFlags on dynamic link library kernel32.dll". No matter if you press "OK", you can also open because your system does not delete what information, so your operating system is still safe. -------------------------------------------------- ---------- 5, delete NTFS partitions? If you want to delete the NTFS partition, you can start your computer with the Windows 2000 CD to enter the installer, delete the partition, or use fdisk, but FDISK cannot delete the NTFS partition in the extended partition, which can be used as the following Debug method:
Debug A 10 MOV AX, 0201 MOV BX, 0100 MOV CX, 0001 MOV DX, 0080 INT 13 INT 20 g = 10 f 2CE 2DD 00 A 10 MOV AX, 0301 g = 10 ing (DUG ?? Depressed ing ~~~~ ~) ------------------------------------------------ ----- 6, how to delete Win2000's default management sharing (C $, D $, etc.)? After win2000 is installed, you can create some hidden shares, you can check them in CMD. There are a lot of articles on IPC intrusion on the Internet, I believe that everyone must be unfamiliar with it. To prohibit these sharing, open administrative tools> Computer Management> Shared Folders> Share Press the right button on the appropriate shared folder, point to stop sharing, but the machine will be restarted, these shares will be reopened again. If you want to ban the default sharing of% Driveletter% $, you can follow the following locations in the registry
HKEY_LOCAL_MACHINT // System // CurrentControlSet // Services // LanmanServer // Parameters New Name: REG_DWORD Value: 0 If you want to ban the default sharing of Admin $, you can hkey_local_machine // system /////////// CurrentControlSet // Services // LanmanServer // Parameters New Name: AutoShaRewks Type: REG_DWORD Value: 0
Default shared directory path and function:
C $ D $ E $ E $ Each partition root directory. In the Win2000 Pro version, only the Administrator and Backup Operators group members can be connected, and the Win2000 Server version Server OperatROS group can also be connected to these shared directories, and the shared directory for the ADMIN $% systemRoot% remote management. Its path will always point to the Win2000 installation path, such as C: / Winnt. FAX $ In Win2000 Server, Fax $ will arrive when Fax client is sent. IPC $ empty. IPC $ sharing provides the ability to log in to the system. Netlogon This shared NET Login service for Windows 2000 servers is processed when dealing with login domain requests. Print $% systemroot% / system32 / spool / drivers user remote management printer ---------------------------------------------------------------- ------------------------------------------- 7, how to get Win2000 start After entering the VGA mode
At NT4.0, after installing the operating system, the VGA mode startup menu will appear, but Win2000 is not, you can add a parameter / basevideo, as follows? Br> [boot loader] Timeout = 30DEFAULT = MULTI (0) DISK (0) RDisk (0) Partition (1) / Winnt [Operating Systems] Multi (0) DISK (0) RDisk (0) Partition (1) / Winnt = "Microsoft Windows 2000 Server" / FastDetect / Basevideo ----------------------------------------------- -------------- 8. What is the use of the hiberfil.sys file under Windows 2000? This file is terrible but deletes it. You must have used the sleep function inside "Power Management" in a certain period. In fact, whether it is sleep, or the STD we have said before, the principle is the same: When the information is saved in this file, restore it back when the Windows 2000 is restarted, and the size of this file is Is equal to your physical memory capacity. Be sure to delete it, the method only one: cancel sleep function. -------------------------------------------------- -------- 9, solve the problem of small memory installation Windows 2000
If you need to install Windows2000 on a machine that is less than 64MB, but in the default, you must have 64MB of memory to install Windows 2000 Server, however, you can bypass this limit. First copy the Windows 2000 I386 installation directory to your local / network drive. Edit the file i386 TXTSETUP.SIF (extension is SIF!) File. Search RequiredMemory. Edit this line, let you change the minimum memory, but before you change, you must fully realize that you have made everything! EG: RequiredMemory = 66584576. save document. Install as usual. Everything OK ... (this method is not suitable for installation with Winnt32.exe, but only is installed with WinNT.exe.) --------------------- -------------------------------------------------- 10 , Microsoft's Windows 2000 Recovery Console
If you use the Windows2000 recovery console, administrators can access 2000 systems from command dialog, replace corrupted files, start and terminate service. When installed, it will add an option to the start menu. Start the system to the Windows2000 inserting installation CD to the I386 directory from the command line to the I386 directory, type: c: /> Winnt32 / cmdcons Click the "OK" file on the confirmation information bar to be copied to the computer, start Add new items in the menu C: / cmdcons/bootsect.dat= "Microsoft Windows 2000 Command Console" / cmdcons Complete the information bar, click "OK" to restart your computer, "Microsoft Windows 2000 Command Console" is selected, start Windows2000 to Command line mode. The system will ask the 2000 installation and its administrator password you want to fix. When you enter your password, you can type commands, such as taking disable to terminate the service, DiskPart to create and delete many other commands such as partitions. Just type HELP can list a list of all commands. You can also hit the console directly from the installation CD. From the disc boot system (if your motherboard supports the optical drive start), select Repair and type C to fix it. If you rename the administrator account, the console can still use it, unless you delete the administrator account. However, the repair console is temporarily unable to work in the domain. -------------------------------------------------- 11. Driver.cab's problem In the C: / Winnt / Driver Cache / i386 directory, there is a compressed file for Driver.cab, a size of approximately 50MB. Surrounded by Windows 2000 built-in drivers, the advantage of establishing this file is that if the system configuration changes, if new peripherals, etc., Windows 2000 can automatically extract the corresponding drivers from the file. Install without the user inserting the Windows 2000 disc. This is a good feature, but for the hard disk space, it is preferred to insert the CD every time in exchange for hard disk space! What's more, for most users, do not change the system of the system. Everyone deletes the driver.cab file as much as possible, releases 50MB of hard disk space. -------------------------------------------- 12, Windows 2000 Server Install the network card as a consideration of the route:
At present, the current operating system, such as NetWare, Windows NT Server 4.0, and Windows 2000 Server, generally only supports a route connection of 4 network cards. If more than 4 network cards, excess network cards will not have routing functions, that is, users connected to the network card cannot communicate with users connected to another 4 network cards. So, the number of network cards installed in a server should not exceed 4. -------------------------------------------------- ---- 13, how to join ordinary users into the administrators group in the case of the working group?
If you have a normal user account, there is a very simple method to get NT Administrator account: first rename the logon.scr under WinntSystem32 to logon.old backup
Then rename usrmgr.exe to logon.scr
Then restart
Logon.scr is the program loaded at startup, after restarting, there will be no previous login password input interface, but the user manager
At this time he has permission to add yourself to the Administrator group. (Xiao Shuai has not done) ------------------------------------------- -------- 14, how to integrate Windows 2000 Service Pack 3 into the WINDOWS 2000 installation disk so that the installed Windows 2000 integrates Service Pack 3, don't have you installed it alone? 1. Download Windows 2000 SP3 from the website, decompress the service package into a directory C: / W2KSP3 through the w2ksp3.exe -x command; 2. Copy the Windows 2000 source installation file to the hard disk C: / w2kinstall (Copy of the entire disc in this directory); 3. Run the update.exe -s: c: / w2kinstall; 4 in C: / W2KSP3 / I386 / update, you can install Windows 2000 through C: / W2kinstall To integrate WINDOWS 2000, it is not necessary to install it separately.
The parameters of Update are as follows: Update [-u] [- f] [- n] [- o] [- z] [- q] [- l] [- s:
Start the Registry Editor, find "HKEY_CURRENT_USER \Software\Microsoft \Windows \currentversion \Policies Hyxplorer", and create a binary key value "Nodrives" in the registry. When the key value corresponding to "NODRIVES" is 01000000, the drive A; the key value is 02000000, the drive B; the key value is 04000000, hiding the drive C ... found the law? Suppose you want to hide the drive letter, ranked n in English letters, then convert 2 (n-1) (N-1) (N-1) to 16-based, this value corresponds to the drive letter to be hidden. For example, to hide the G disk, g is ranking 7 and 2 in English letters equal to 64, and 64 converts 64 to 16. The value of "NODRIVES" is: "40 00 00"
-------------------------------------------------- ------- 16. Remove unwanted components in Windows 2000
After the Windows 2000 installation is complete, some components (such as components in the attachment) have all been installed. For components that general users do not use, such as accessories, code conversion, etc. can be deleted. If you want to delete these unwanted components in Windows 98, you can open the Control Panel, Click to Add / Remove Programs. "Icon, select and delete in the Add / Delete Windows Components tab. However, in Windows 2000, it is not possible to delete this method because there is no such components in the Add / Remove Windows Component list. Is there a way to add these components in the Add / Remove Programs list? ---- Introduction to a method that can add these components in the Add / Remove Windows Components list, then remove these unnecessary components, the specific steps are as follows. ----1. Double-click the "My Computer" icon on your desktop, select Tools * "Folder Selection", select "Show all files and folders" in the Advanced Settings option of the View tab. The purpose of this setting is to display hidden folders and files.
----2. Go to the Windows 2000 system directory, generally for the winnt directory, then enter the inflicity (that is, C: / WinNT / INF), this directory is an implicit directory, there is a sysoc.inf file in this directory, this file is only 4KB, first Back up this file, use the text editing software to open this file after the backup is complete, then click the "Edit" menu, select the "Replace" option, enter ", hide" in "Finding Content", what is not all in "replacement" Lose, then click the "All Replace" buttons to save this file exit.
---- 3. Click Start * "Settings" * "Control Panel", double-click the Add / Remove Programs icon, then click the Add / Remove Windows Component button, open the Windows Component Wizard window, more than 5 in the component Items, such as "COM ", "Distributed Transaction Coordinator", "Fax Services", "Accessories, Tools", "Image Processing", etc. (as shown in the drawings), then remove the components from it is deleted. -------------------------------------------------- ----- 17, RIS client pre-classification and run sysprep.exe
When using RIS to install Windows 2000 Professional, you can use pre-procurement, you must enter the GUID of the client when you create a client, how to enter? A global unique identifier (GUID) that relies on the computer. GUID is usually the MAC address of the NIC. In front of the MAC address of the NIC, add enough forward zero to ensure that the GUID is 32 16-based numbers is a complete GUID. Example 000000-0000-0000-0000-5254AB15C2EE wherein "52-54-AB-15-C2-EE" is the MAC address of the client network card.
After running sysprep.exe on an experimental machine, you will be prompted to turn off your computer. At this time, it should be noted when you restart your computer. If you still start from your hard drive, you will be installed. So you should choose from to start the computer from the floppy disk or other media, and use a third-party image software to make clones throughout the hard disk or partition. Then distribute the cloned files into each computer, then use the third-party image software to solve the image on each computer, then select the installation from the hard disk.
Before running sysprep, or first familiar with its main switch parameters:
-Sysprep.inf Use sysprep.inf to configure a computer, apply to a computer-nosidgen computer that is used to clone and does not generate a new SID number. -------------------------------------------------- ------ 18. Note when using RIS to implement the client to install the operating system: If you start with the NIC, first ensure that the client's system BIOS has set the network card to the first startup device. When the client starts, it automatically connects the RIS server. After the connection is connected, the RIS server prompts the user to press the F12 to download the user to install the Smart Wizard, and the user only needs to be repaired when the first installation system or system is damaged. F12, It is usually not used. If you start with a floppy disk, you will be prompted to press the F12 to initialize the network service. After Press F12, you must remember to remove the startup floppy before the character appears. -------------------------------------------------- -19 How to upgrade NT4 Domain to Win2000 domain, you must pay attention to the following points:
1, NT4's primary domain controller PDC must be using NTFS file system format, if the FAT16 format will fail; 2, NT4 upgrade is unidirectional, so there is no way after upgrading Win2000B3; 3, doing When upgrading the plan, you must first back up important information and pre-preparation work, and remove applications that cannot be performed in Win2000B3, etc.; 4, first upgrade the PDC and upgrade BDC (before upgrading PDC, please depart from BDC first, After the PDC is completely upgraded to Win2000B3 domain controller, upgrade BDC or selects the environment that does not upgrade BDC reserves NT4); 5, the installer will have three important directories, including Active Directory, Log Archives and Sysvol Directory, make sure the path to the directory under the NTFS partition; 6, the user account, group account, and computer account will be retained after the upgrade. -------------------------------------------------- --20, incorporate fax in Win2000
First, install a modem that supports faxes normally; after installing the modem, the modem you use will appear in the lower right corner of the taskbar. Since the Fax machine of Win 2000 is sent without receiving fax, if we want it to automatically receive the fax, you must right-click your modem name and select in the pop-up menu. "Receive"; additional computer transmission fax is implemented by "print" function, whether it is the same regardless of the image or text, so we can pass the content of the fax in Word or other editor, then select File / Print "Menu, select" Fax "and click" Print "button," Fax Send Wizard ", click" Next ", enter the recipient's name and phone number, and then select" Immediately according to its own actual situation "or "Time to send". ------------------------------------------- ------------ 21, first install Windows XP and then install the Windows 2000 to restore the startup menu
Enter the recovery console, run the command: fixmbr C: fixboot c: copy x: / i386 / ntdr C: Copy x: /i386/nttect.com C: X is the optical drive. -------------------------------------------------- - - 22 Error information: "The Windows Installer Service Could Not Be Accur if you are running Windows in Safe Mode, or if The Windows Installer IS Not Correctly Installed ....". The reason for this error is Windows 2000 SP3 Contains version 2.0.2600.2 version of Windows Installer, when DCOM's default IMPERSOTION Level is set to Anonymous, this MSI version cannot run normally. And after the W2K SP3 is installed, the system will remain in the system, even if you re-upgrade SP3, it will not function properly. In order to successfully install SP3, you need to set the Impersonation Level for the DCOM for Identify, and to delete the residual file /%Windir%/system32/msisip.dll when the installation fails. DCOM Impersonation Level Setting: 1. Run DCOMCNFG 2. If you have some objects are not registered, the program will prompt you to register. 3. Enter the DCOM Setting Properties, select Default Properties, and set the default impersonation for Identify. -------------------------------------------------- ----- 23, making custom boot floppy disk 1, use Format A: / s in pure DOS to process a floppy disk 2, create file config.sys in the floppy disk, and edit the command line: device = oakcdrom.sys / d: mscdxxx device = himem.sys (for system information file Himem.sys), so that the DOS system can run smartdrv.exe) DOS = high, umb files = 60buffers = 803, create file autoexec in the disk. BAT, and edit the command line: LoadHigh A: / smartdrv / l A: /mscdex.exe /d: mscdxxx4 ,oakcdrom.sys and himem.sys copy to a disk
Note: Command line in config.sys Device = Oakcdrom.sys / d: Mscdxxx and autoexec.bat's command line: A: / mscdex.exe / d: mscdxxx is to load the optical drive under pure DOS. The xxx in the MSCDXXX in config.sys and autoexec.bat can be any character, but both must be the same. -------------------------------------------------- --- 24, manually add a route in the system and make it permanently curing
For example, "Route ADD 192.168.50.0 192.168.4.100, but how to automatically load the route each time, can be added back, it will be permanently cured. Add a static route record in using the -p parameter. After that, this record is stored in the registry, in the specific location: hkey_local_machine / system / currentcontrolset / services / tcpip / parameters / personTentRoutes -------------------------------------------------------------------------- -------------------------------------------- Win2000 for the for command application: open a DOS window in Win2000, then execute FOR / L% a in (1, 1, 254) Do Start / min / low telnet 192.168.0.% A 3389 This section of the open 3389 port of this section will expose this command will be in the task 254 small windows opened in the field horrible, it is recommended that there is no archive, first store.
Scan multiple ports of a host, as follows for / l% a in (1, 1, 65535) Do Start / Low / MIN Telnet 192.168.0.1% A This is to scan 192.168.0.1 1 to 65535 port
Scan all ports for a network segment for / l% a in (1,1,654) do for / l% b in (1, 1, 65535) do start / low telnet 192.168.0.% A% B Scan all 1 to 65535 section of 192.168.0.x paragraph
The above command can only be used under Win2000, because / L accumulated parameters are Win2000 to Forward expansion of the WinXP and Win.Net. Other have not tried ------------- -------------------------------------- 26, MTU
We know that the MTU (Maximum Transfer Unit Maximum Transmission Unit) defines the number of bytes included in the network transmitted in the network of TCP / IP protocols, and the access speed and stability of the network can be effectively improved by adjusting this parameter. In a Windows95 environment, the default setting of this value is 1500 bytes. Since the MTU is set to 576 bytes of routers, the result of the data packet size has caused 1500 bytes of data packets. Slimed into a number of 576 bytes or less packets, causing the system transfer speed to decrease. In order to match the size of the packet, you must regulate the relevant numerical value under the registration. -------------------------------------------------- --27, WINDOWS serial number in the operating system
WINDOWS 98 installation serial number: 1. Open the registry editor under the premise of enter the operating system, expand the HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion branch, find "ProductKey" string value in the right window, it The key value is the serial number! 2, if you can't enter the operating system, you can view the serial number of Windows 98 under DOS: Start your computer with the boot disk, then enter C: / Windows / Command / Find / L "ProductKey" C: /Windows/system.dat (assuming C The disk is a system disk), and the serial number of Windows 98 will be displayed after entering.
WINDOWS 2000 installation serial number: Enter the Windows 2000 system installation folder, open the / system32 folder, find $ winnt $ .inf file, double-click the notepad to open, [userData] section "ProductID =" back quotation characters String is the serial number of Windows 2000! XP and 2003 are the same. ---------------------------------------------- 28, SYS .Comsys.com command, this command is specifically used to "transfer" from the source disk to the target disk, and will copy the system file on the source disk (such as IO.SYS and other system files) to the corresponding position of the target disk. Make the target disk can be started separately. When you turn it on, the system will prompt you: Invalid system disk, MS-DOS version does not match the error message, the command.com command is damaged, you can "pass the correct operating system" pass "to your hard disk, such as It turns out that your computer is started from the C drive, then you can type "SYS C:" after starting with the boot disk. After the operation is completed, the system will prompt: "System Transferred", after restarting, it is generally possible to run normally, so it is removed from your reinstall system. The SYS command is the cleansing means of rebuilding the Boot area, or killing the Boot area virus. (The Boot area here is actually the guiding sector on the activity partition) --------------------------------- --------------- 29, FDISK hidden parameters
Its grammar format is: fdisk / parameter 1, / Actok does not check if there is a bad sector on disk surface: Use this parameter to speed up partition operation. 2, / cMBR Re-establish the main boot record of the specified disk: its operation is equivalent to / MBR parameters, and the difference is that the disk can be specified. 3, / EXT Establish extended partition: establish an extension partition on the current disk (establish a logical disk partition for aged) 4, / fprmt In interactive mode U. Support for large-capacity inquiry screens, but inquiry when establishing a new partition, use FAT16 or FAT32 format. 5, / log build disk logical partition: establish a logical disk, must be used at the same time as / ext. 6, / logo uses FAT16 to establish a disk logical partition. 7. / MBR Re-establishs the main boot record 446 bytes of the master boot record. 8, / PRI establishes a residential area, and the partition will automatically be set to an activation form. 9. / Prio uses the FAT16 format to establish a primary partition and set to an activation form. 10, / Q End FDisk is not restarting the computer: Use it to restart your computer after changing the partition table. 11, / status Display Current Disk Partition Status: When there is no logical partition on the disk extension partition, the extension partition will not be displayed. 12, / x Do not use the LBA property: Use it will not produce partitions with LBA properties. -------------------------------------------------- -30, completely delete WinMe system restore
1. First click on "My Computer" to select "Properties", in the Performance tab, select File System, and select "Disable System Restore" in the Troubleshooting tab. 2, run the regedit, find hkey_local_machine / system / currentControlSet / Services / VXD / VXDMON / Clear all the keys 3, restart your computer to delete the C: / _ restore directory (hidden folder). ----------------------------------------- 31, Windows 2000 BUGS in a gives Everyone At the end of the directory of Full Control, you will create a file, remove the permission of this file, set to Administrator Full Control Only. Then use any ordinary user to log in, enter this EVERYONE FULL Control directory, try to access this file, of course, is of course refusing access. But you can delete it! This problem briefly explains that you can see through the description of WinHelp's File Permission. It is more referred to, and there is a relationship with a File Delete Child's hidden authority. Microsoft's explanation is to ensure that UNIX is compatible. Because the Win2K system is too large, if the permissions between the domains are more complicated, it will be very complicated. Therefore, if there is something that needs to be protected, perhaps use DENY permissions better.
EFS is indeed a very powerful set of encryption systems, because of its power, we have to be cautious and cautious in use. First before the addition and deletion of AD, you must remove all EFS encryption, otherwise this EFS encrypted file or folder will never be opened. This is actually warned when installing or deleting the AD, can be easily ignored by the user. For specific reasons I think is because Local Administrator and the SID of Domain Administrator are different, so there is a problem. In addition, when performing Duplicate operation, it is necessary to remove EFS before executing sysprep, otherwise these data will never be read. Another problem with EFS is that it cannot prevent a file from being deleted. That is, as long as a user has permission to enter the directory where the EFS encryption file is located, you can delete it, so you can put it on the folder encryption and setting permissions in the EFS file. ------------------------------------------ 32, find the bottleneck of the system
1. Finding the memory bottleneck to use the following counter to identify the bottleneck memory resources: (1) System / Processor Queue Length (2) Memory / Pages / Sec 2, Find Disk Bottlenecks in Performance Tools Use the following counter identifies bottlenecks Disk resources: (1) PhysicalDisk /% Disk Time and% idle Time (2) PhysicalDisk / Disk Reads / Sec and Disk Writes / Sec (3) PhysicalDisk / Avg.disk Queue Length (4) LogicalDisk /% Free Space Monitor the memory counter to determine if there are too many memory pagings to make the disk use tension. Note: Unlike physical disk counters, the data of logical disk counters is not collected by the operating system by default. To obtain a logical drive or the performance counter data of the storage volume, you must type diskperf -yv at the command prompt. This results in a disk performance statistical driver for collecting disk performance data to report data of logical drives and storage volumes. By default, the operating system uses the diskperf -yd command to include physical drive data. For more information on using the DiskPerf command, type Diskperf at the command prompt -? 3. Finding processor bottlenecks using the following counter to identify processor resources: (1) Processor / Interrupts / Sec (2) Processor /% Processor Time (3) Process /% Processor Time (4) /% PROCESSOR TIME (4 System / Processor Queue Length 4, find network bottlenecks in performance tools to identify bottleneck network resources: (1) Network interface / bytes Total / Sec, Bytes Sent / Sec and Bytes Received / Sec (2) Protocol_Layer_Object / Segments Received / Sec, SEGMENTS SENT / Sec, Frames Sent / Sec, Frames Received / Sec, for the NWLINK performance object, with frame-related counters report zero. Use the object-based counter. (3) Server / Bytes Total / Sec, Bytes Received / Sec and Bytes Sent / Sec (4) Network Segment /% Network Utilization ---------------------- ---------------------- 33, there are many ways to close the 445 port, but I recommend the following methods: Modify the registry, add a key value Huest: hkey_local_machinekey: System / Controlset / Services / Netbt / ParametersName: SMBDeviceEnabled Type: REG_DWORDVALUE: 0
After the modification, restart the machine and run "netstat -an", you will find that your 445 port is no longer listenging.
-------------------------------------------- 34, Windows 98 Extract.exe and ext.exe
In fact, the Windows 98 super boot disk also has this command. This command has appeared in DOS6.22, which is originally just a command to decompress the CAB compression package in Microsoft. However, its function is not only unzipped. We are more for using it to restore system files in the CDD. (If you can enter the graphical interface, you can use SFC, which is more powerful, convenient) The following is the use parameter and command format of the extract.exe command: / y Overwrite the existing files no longer prompt / a process all CAB File, from the specified first CAB file start / D display the directory of the file contained in the CAB file, no decompression / e decompression, replace "*. *", That is, unpacking all file / L DIR specified solutions The location of the compressed file, the default is the current directory / c copy CAB file When we know that the system files you want to recover are in the location where you are in the installation CD, you can use extract / y win98_27.cab cdfs.vxd command (from Windows 98 Installing the name of the Win98_27.cab compression package in the installation CD). However, if you don't know the exact location at this file, you must first use the extract / d win98 _ *. CAB (here * is a number representing the CAB file package) to view CDFS.VxDG for each CAB file, Trouble.
Ext.exe. I just introduced that there is a bit of trouble when extract.exe finds a system file that the path is unstuten, if it combines it with ext.exe, you don't need to know the specific path to the file. However, it is important to note that this ext.exe command is in an ebd.cab compression package, you can't use it directly. You must first use the extract / y ebd.cab ext.exe command to extract EXT.EXE in the EBD.CAB compression package to the same directory, now you know the effect of EBD.CAB compression package? .
Use the ext.exe command to quickly restore the system files of the unknown path from the CD, type the ext.exe command, then "please enter the path windows cable" "_", type Windows 98 installation The path where the disk, such as "G: / PWIN98", "please enter to name (s) of the file (s) You want to extract:", type the file name you need to find, if still CDFS.VXD, I will prompt "Enter": "for current directory:", it means that it means to enter the path to be unzipped, such as C: / Windows / SYSTEM ", Will appear as follows:
The Options you entered WERE: SOURCE PATH: G: / PWIN98File (s) to extract: cdfs.vxddstination path: c: / windows / systemis this okay? (Y / n):
After "Y", the ext command quickly started, but it can not only find the detailed location of the file, but it can automatically decompress the file until the file is released to the specified path, and the speed is extremely fast. ------------------------------------- 35, there is no tool to drop the dynamic disk back Go to the basic disk?
I have repeatedly trying to try, successful: Installing Recovery Console, enter the recovery console, delete one or two unimported volumes with the diskpart command, restart, discovery has changed back to the basic disk, unselected volume Data is intact (Xiao Shuai has not done !!!!!!) ---------------------------------- ------- 36, Win2000 is unable to solve the solution
Win2000 has such a feature. When our network cable is broken due to various reasons, the system will prompt your network cable without a connection. You will make your address no longer force, causing some of the only friends who don't have a friend without even network. Can't do it. Now give a solution, but not guaranteed certain success (in a large part of the NIC is unsuccessful. Win2000 is called "Media Sense) 1. We can pass this function through the registry. It is forbidden, as follows: hkey_local_machine / system / currentcontrolset / services / tcpip / parameters There is a keyword for disabledhcpmediasense, DWORD type (if you don't have yourself), the default is 0 to open the detection function, set it to 1 Turn off the detection. After the modification is complete, restart your computer, then you remove the network cable, though the system is still displayed, but the IP bound to the NIC is still tube.
Second, you can make a back rotation, 1326 connects to deception can also be concatenated: take the crystal head network card one end: orange white, orange, green white, blue, blue white, green, brown white, brown, the other end does not pick up RJ-45 Directly connect 13, 26 directly, that is, orange white, orange, green, other 6 lines do not need to pay
--------------------------------------- 37, NT does not recognize the hard disk, can only identify 8G hard drive solution
Replace the original file in the i386 directory in the NT installation disc, then run the installer or replace the copy with these two files after running the installer or after the NT replication file is used to the hard disk. On the $ ** $ file on the C drive, you can install NT4.0 on a large capacity hard drive without re-adjusting the partition.
---------------------------------------- 38, how to use the Netsh command to put an IAS Configure COPY to another IAS?
Netsh aaa show config> path / file.txt netsh exec file.txt should be available in Netsh aaaa dump> file.txt in 2k3
----------------------------------------- 39, you can install route under Win2000 Pro And remotely access components to make it a remote login server?
2K pro is a RRAS function, but there is only one MMC Console, 2K Pro's RRAS only has a service, just start the management tool -> service Routing and Remote Access service to start (not started by default), Then you can see "Incoming Connections" in the network neighbor. In the incoming connection, the RAS customer, VPN customers, etc., 2K pro, only support three remote users, RAS, VPN, and direct connection accept one Customers, together three customers.
---------------------------------------- 40, Rras Console Displays An "Internal" routing InterfaceAfter you install Routing and Remote Access Services (RRAS), an interface named "Internal" appears under Routing Interfaces in the Routing and Remote Access Services management console.This interface is part of RRAS and represents all Remote Access Services (RAS) devices. All Ras Clients Are Part of this Interface. The "Internal" Interface Should Not Be deleted
---------------------------------------- 41, how to increase storage in the ARP buffer Project save time?
The time default value saved in the ARP buffer project is two minutes, and it can be changed below:
Open the registry editor; find HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / TCPIP / Parameters to find "Double-Value" under "New", enter the name arpCachelife, enter the number of seconds you want to save; exit the editor, restart your computer I.e.
------------------------------------- 42, modify the password of the domain controller?
After using Erd Commander 2002, the ISO CD is started to change the DC local password. The DC is the hand to the hand. Use the local administrator password to log in to this machine (directory recovery mode), then configure the local security policy boot script, suppose you The domain administrator's account is admin, the content of the boot script should be NET user admin 12345678 to save into the admin.bat file, then restart. Then your DC administrator password is changed to 12345678. Everything will be done.
-------------------------------------- 43, to disable the Office XP text service? ?
Removing CTFMon.exe from MSConfig does not disable text services. Because the text service will start automatically when you start a pro program. To prohibit text services, follow these steps:
Step 1: Remove Chinese Optional User Enter Method For Windows 2000 systems, delete this feature: 1. Exit the Office program. 2. Click Start, click Setting, and then click Control Panel. 3. In the Control Panel, double-click Add / Remove Programs. 4. In the current installer list, select Microsoft Office XP products. Click to change. 5. In the Maintenance Mode dialog box, select Add or Remove Components, then click Next. The dialog box to select the installation option is displayed. 6. Click the plus number before the Office sharing function. 7. Click on the icon of the Chinese optional user input method to select not installed. 8. Click Update.
Step 2: Remove the optional user input from the text service:
1. Click Start, click Setting, and then click Control Panel. 2. In the control panel, double-click the text service. 3. In the installed service list, except English (US), one by one deletes the remaining input method. Step 3: Run the Regsvr32 / U logout MSIMTF.DLL and MSCTF.DLL files.
1. Click Start -> Run. 2. In the Run dialog, type the following command: "Regsvr32.exe / u msimtf.dll" (excluding dual quotes) 3. Click OK. 4. Repeat 1 to 3 steps for MSCTF.dll files.
After prohibiting the text service, you can add other input methods as before.
-------------------------------------------------- -44, what is RPC? ?
Inter-process communication (IPC) is a communication technology used by programs and processes run between multitasking operating systems or networking computers. There are two types of process communication (IPC).
Local Process Call (LPC) LPC is used in multi-tasking operating systems such that tasks running simultaneously can be sessions. These tasks shared memory space allows tasks to synchronize and transmit information. Remote Process Call (RPC) RPC is similar to LPC, just working online. RPC begins to appear in a computer that runs a SUN microsystem and HP's running UNIX operating system.
By IPC and RPC, the program can utilize other programs or computer processing processes. Client / Server Mode Calculation The remote process calls with other technologies such as messages, as a mechanism for inter-system communication. The client executes its own task, but provides backend file services by the server. RPC provides the client to provide a communication mechanism for the rear server application service, as shown in Figure R-4. If you want the client / server application to be a separate program, the server can run the data access section because it is recently separated by the data, and the client can run the data representation and the front end portion interact with the user. Thus, the remote process call can be seen as part of the part of the split program through the network. LPC is sometimes also known as coupling mechanism. Use this method to divide the program, do not need to copy the entire database or most of its programs to the user system when the user wants to access the data. In fact, the server only processes the request, even only performs some data calculations, and sends the resulting result to the user. Because when the data is placed in one place, the database synchronization is easy to implement, so many users can access the same data simultaneously. The distributed computing environment is a computer cluster connected by a communication system-network connection. It is easy to see this network as a computing platform. If it is equal, any computer can be a client or server. Some processing tasks can be divided into separate runners in parallel on different network computers, while independent programs are handed over to computer processing that best suits this task. This strategy can use computer idle resources to improve network efficiency. A typical enterprise network includes many heterogeneous computer systems that run different operating systems.
------------------------------------------------- 45 How to prohibit anonymous users from connecting your IPC $ sharing?
We can implement it by modifying the registry
Key: HKLM / System / CurrentControlSet / Control / LSA
Name: restrictanonymous
TYPE: REG_DWORD
Value: 1 | 2
Note: When the value is set to 1, anonymous users cannot list the host user list; when the value is set to 2, anonymous users cannot connect your IPS $ sharing, not recommended 2, otherwise you may cause some of your services that you can't Start, such as SQL Server ...------------------------------------------------------------------------------------------------------------------ ----- 46, regedit.exe parameters:
FileName Import .reg file enter the registry
/ s import.REG file incoming registry (quiet mode)
/ e export registry file
Example: regedit / e filename.reg HKEY_LOCAL_MACHINE / SYSTEM
/ L: System.dat specifies system.dat
/ R: User specifies user.dat
/ C compression [file name] (Windows 98)
-------------------------------------------------- ---- 47, ". REG" file full Raiders
In order to facilitate the modification of the registry, we will make some scripts, but whether it is an INF file or a VBS script, I think it is only the .reg file is the most convenient. About the operation of the registry, common is to create, modify, delete.
--create
Create a division, one is to create a child (Subkey) Note: If you are not very clear about the naming of the registry, you can check the registry naming standard manual (http://www.sometips.com/tips/registryhack /204.htm)
We create a file, the content is as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]
Then execute this script, you have created a child name "Test4Adam" in HKEY_LOCAL_MACHINE / SOFTWARE /.
The other is to create a project name that file format is a typical file format, which is consistent with the file format you exported from the registry, as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM] "Test1" = "ADAM" "TEST2" = HEX: 61 "Test3" = dword: 00000064
Test1 type is "String Value" Test2 type is "binary value" TEST3 type is "dword value"
Note: If there is no Test4adam in your registry, the script will create the child for you.
- Modifying modifications is relatively simple, just export you need to modify, then modify it with Notepad, then import it, here I will not repeat it.
- Delete Let's first delete a project name, we create a file as follows:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM] "TEST1" = -
Execute this script, "Test1" under HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM is deleted;
Let's take a look at the delete one child, we create a script as follows:
Windows Registry Editor Version 5.00
[-HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM] Execute this script, HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM has been deleted.
-------------------------------------------------- ------ 48, Power Users Group:
Members of the Power User group can modify the non-administrative user's account, start the service that is not started by default (note, the member of a Power User Group cannot stop a system service), the group member cannot modify the administrator's account password , Install the system service or modify the operating system file.
-------------------------------------------------- ----- 49, Remote Backup and Restore:
The corresponding operating system path in the boot.ini file on the remote computer is added to the / safeboot: dsrepair command option, boot the remote machine to the recovery mode, then use the planned task or the AT command to implement backup and restore. Implementing remote restarts You can use the corresponding management programs in 2000, XP, 2003.
-------------------------------------------------- ------ 50, Ras Client Get DHCP Options:
the mobile users receive their IP configurations from the Remote Access Server, but they are not able to receive any DHCP options. In order to enable this, a DHCP relay agent must be configured on the Remote Access server. This will allow DHCPINFORM, which are Used to Obtain Windows Internet Name Service (WINS) AND Domain Name System (DNS) Addresses, Domain Name, Default Gateway Or Other DHCP Options Originating from The DHCP Server, To Reach The Mobile Clients.
-------------------------------------------------- ------ 51, copy the IAS settings using the netsh command:
Remote Access Policies are not stored in Active Directory; they are stored locally in theIAS.MDB file To copy the IAS configuration to another server we must type netsh aaaa show config
User classes allow DHCP clients to differentiate themselves by specifying a User Class option.When available for client use, this option includes a user-determined class ID that can help to group clients of similar configuration needs within a scope, such as providing a shorter lease .
To configure a User Class Lease Time we must open the DHCP console, select the DHCP Server, open Scope, Right click Scope options, select Configure Options, select the Advanced ban, Select appropriate Vendor Class and User Class (= Windows2000LapTopComputers in this example) , SELECT 051 Lease, And Enter Lease Time: 14400 (4 Hours = 14400 Seconds)
-------------------------------------------------- ------- 53, mobile DHCP database:
To move the DHCP Database we must first stop the DHCP service on the old server, back up the Registry key HKLM / SOFTWARE / Microsoft / DhcpServer / Configuration, and install DCHP on the new server.We must then stop the DHCP service on the new server and restore the Registry key from the old server onto the new server Then we must delete the contents of C:. / WINNT / System32 / DHCP on the new server, copy the database file DHCP.MDB from the old server onto the new server but not the transaction logging (* .LOG) and checkpoint (* .CHK) files and start the DHCP Service on the new server. Finally we must reconcile all scopes on the new server to synchronize the database with the Registry .---- -------------------------------------------------- --54, DNS aging recording function:
Previous versions of Microsoft operating systems that do not support dynamic Domain Name System (DNS) require that a static DNS entry use a static IP address whenever possible. If we upgrade to Microsoft Windows 2000 and our present DNS server is Windows 2000, the IP address will remain the same, but the DNS "A" record remains static. However, the static PTR record is converted to a dynamic entry and is subject to the aging process. The Windows 2000 Dynamic Domain Name System (DDNS) client does not overwrite an EXISTING "A" Record If The IP Addresses Match. To Convert Static Entries To Dynamic Entries, We Must Use The / AgeallRecords Option In The DNSCMD.EXE Command.
-------------------------------------------------- ------ 55, a useful command in NBTSTAT:
.
-------------------------------------------------- ------- 56, DNS is fast zone transfer format: By default, all Windows-based DNS servers use a fast zone transfer format, which uses compression and can include multiple records per TCP message during a connected transfer This format. IS Also Compatible with More Recent Berkeley Internet Name Domain (Bind -Based DNS Servers That Run Versions 4.9.4 and later.
-------------------------------------------------- ------- 57, 98/2000 / XP / 2003 Issues Access XP
Some people say that enabling Guest, some people even install NetBeui et al. Since then, you will summarize the correct statement, pay attention to the 98/2000 / XP / 2003 access to XP / 2003 user authentication issues with normal network connection.
First of all, I can't access the guests why you cannot access. 1. By default, XP disables guest account 2. By default, XP local security policies are prohibited from accessing GUEST users from network. By default, XP's local security policy - User Rights Assassin, "Empty Case Users can only log in to the console" are enabled, that is, any account of the empty password cannot be locally logged in, Guest Default empty password ··· So, if you need to use guest users to access XP, you want to perform the above three settings: Enable guest, modify the security policy allows Guest to access, disable 3 security policies or give guests.
Sometimes it will encounter another situation: When accessing XP, the username in the login dialog is gray, which is always a guest user, and cannot enter other user accounts. The reason is that this security policy is in the Strange (Management Tool - Local Security Policy - Security Options - "Network Access: Sharing and Security Mode for local accounts"). By default, XP's access method is the way "only guest", then you access it, of course, you cannot enter other user accounts for GUEST. So, accessing the easiest way to access the XP is: No need to enable guest, only modify the above security policy is "classic". Other systems access XP can enter account information.
As for accessing 2003, by default 2003 disable guest, but there is no XP that hate the default contradictory guest mode sharing, so you can enter your username password access.
-------------------------------------------------- ------ 58, IPX / SPX Frame Type:
NetWare 3.11 uses the 802.3 frame type. Netware 3.12 and above uses the 802.2 frame type. This network has both NetWare 3.11 and NetWare 4.1 servers, so both Frame Types must be installed. Installation of multiple frame types on a Windows 2000 Professional requires editing of the Registry, specifically add both types to the multi-string value pktType in HKLM / SYSTEM / CurrentControlSet / Services / NwlnkIPX / Parameters / Adapters /
ANSI: System preset standard text storage format. ANSI is an abbreviation for American National Standards Institute. It was established in 1918 and a voluntary organization with more than 1300 members, including all large computer companies. ANSI is specifically established for computer industry, which is a considerable standard of standards in the world.
Unicode: The integration of all major directive files in the world, including the public segments used in business and personal computers. When you use the Unicode format to store files, you can use the Unicode Control Character Assistment Description Language Coverage, such as Arabic, Hebrew. User Enter the text containing Unicode characters in "Notepad" and stores files, the system will prompt you to select Unicode encoding in Save As, these characters will not be lost. You need to remind everyone that some Windows 2000 fonts cannot display all Unicode characters. If some characters are missing in the discovery file, simply change it to other fonts.
Unicode Big Endian: The text bitmap (storage unit) in the Unicode file established on the BIG-Endian processor (such as Apple Macintosh) is arranged in order of the text bit tuplement of files established on the Intel processor in contrast. The most important bit group has the lowest address and will first store a larger end of the text. In order to allow users of such computers to access your files, select the Unicode Big-Endian format.
UTF-8: UTF means universal character set transformation format, UTF-8 is the 8-bit form format of Unicode. If you use only important information of 8 bitmines within the same location in group, you can choose the UTF-8 format. -------------------------------------------------- ----- 60, the CA certificate revocation:
Revoking a certificate is a two step process first we must revoke the certificate and then create (this is done automatically) and publish the Certificate Revocation List (CRL). Finally, the Certificate Revocation Lists (CRLs) must be accessible to all users. It SHOULD BE PUT IN A NetWork Share and The Users Should Have Appropriate (Read) Permission to The Share. ----------------------------- -------------------------- 61, hide your computer in the network neighbors, 2000 absolutely available: a. Edit Registration : Set the value of HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENSERVER / Parameters to 1, which is a DWORD type.
B. Run as follows: Net config server / hidden: YES This user may connect to your computer but cannot see you in the network neighbor.