Selfless! ! ! ! ! Have all collections! ! There is also part, finishing 1, install Win2K free serial number
method one:
In the process of installing the Windows2000, you want to enter the registration number during the process of installing the Windows 2000. In order to make the installation, you need to enter the registration number during the installation process. Copy the installation file to the hard disk, open the setupp.ini under the i386 directory, change the number behind the PID to 51837270, then you will ask you to enter the serial number again during the entire installation process.
Method Two:
After the content of the file is completely removed, the rewest is changed as the following information:
[PID]
PID
=
"42144270"
EXTRADATA = 62706A776C7766637274CE52597B39
----------------------------------------------
2. Use the command line format installed with the answer file
Use the floppy disk to start using WinNT.exe to implement an unrecognized installation: WinNT.exe
/u:d:/setup.txt
/ S: D: / i386
/ T: C:
Enter the operating system, use the Winnt32.exe installation new system to implement an unrecognized installation: Winnt32.exe
/u:d:/setup.txt
/ S: D: / i386
/ Tempdrive: C:
Using the CD-ROM to start the unrecognized installation: A. Creating a reply file named Winnt.sif, putting its related files into a floppy disk or engraving the file into Windows
2000 / XP installation in the i386 directory in the disc. b, start the computer with a 2000 CD to implement an automatic installation process without answering. The floppy disk is automatically called in the floppy disk or the response file in the CD I386 Winnt.SIF.
/ syspart: drive_letter
Indicates that the installation start file can be copied to a hard disk and mark the hard disk as an active, and then install the disk to other computers. When the computer is started, it will automatically start the next phase of the installation. However, you must always use the / tempDrive parameter and / syspart parameter. Running Windows
NT
4.0, windows
2000
Or Windows
On the computer of XP, you can use the / syspart option to start
Winnt32. Run Windows
95, Windows
98 or Windows
ME
The computer cannot use this option. This parameter can only be valid when running Winnt32.exe.
Special key name and function:
Key name: repartition
Key value: Yes | NO
Specifies whether to restrict and format the client first primary disc (formatted to NTFS system). This is only in Windows
2000 CD boot computer for unattended participation in installation.
Key Name: ExtendoemPartition
Key value: 0 | 1
Allow installation to establish expansion partitions
-------------------------------------------------- -
3, how to maintain system files in Windows2000
WINDOWS
2000 report tells what to do if your system file is replaced or deleted? This is a problem that will appear from time to time, you can use Windows
The system file protection program from 2000 is restored. In Windows
In 2000, the SFC command is useful for maintaining the entire system file. Specific practice is:
In the "Start" / "Run", enter "SFC / Scannow" to scan the system file and fix it.
The SFC command statement is as follows:
SFC
[/ scannow]
[/ scanind]
[/ scanboot]
[/ ca Zancel]
[/ enable]
[/ purgeCache]
[/ cachesize = x]
[/ quiet]
. Where: / scannow immediately scans all protected system files.
/ scanind
Scan all protected system files once.
/ scanboot
Scan all protected system files each time you start.
/ ca ZANCEL
Cancel all the scans of all suspended protected system files.
/ enable
Enabled for normal operation
Windows
Document protection.
/ purgecache
Clear the file cache and immediately scan all protected system files.
/ cachesize = x
Set the file cache size.
/ quiet
Do not prompt users to replace all incorrect file versions.
You can choose to use these commands as needed.
-------------------------------------------------- ---------------
4, Windows
2000
The magical use of environment variables
Install Windows
2000
Professional version, C disk still installing Winodws
98, and WinodWS
2000 installed on the E disk (application software is in Windows
Install under 98). Try to open some software without installing, find that Visual
FoxPro
6, VC , WPS
2000 and other software can be used directly, WinZIP8.0 and other software input registration number can also be used, Photoshop and other software open, pop up a series of dialog boxes, display the following information: The following dynamic link library PFPICK can not be found. DLL with the path: D
/ Program
FILES / Adobe / Photoshop5.0cs / Winnt / System32 /
Winnt / system
/ Winnt
/ WinNT / System32 / WBEM
But after all the way, click OK, it is still open. Can you not let these dialogs appear? This involves Windows
The environment variable setting of 2000.
Although Windows
98 There is also an environment variable in the registry, but there is no Windows
2000 This is easy to modify. Analyze the contents of the above dialogs, the first is the software installation path, the rest is the system directory, the last one is the path setting of the environment variable. Then look up the dynamic link library file PFPICK. The DLL location is found in the system directory.
Thus, open the control panel, double-click System, select Environment Variables in "Advanced", you can see two dialogs, "User Variables" above, set up a temporary variable, used to store temporary files The following is "System Variable", set some system parameters, we need to modify this "path" path here:% systemroot% / system32
% Systemroot%
% SystemRoot% / System32 / WBEM
We only need to add some statements behind: "C
/ Windows
C
/ Windows / System
C
/ Windows / system32
", Then restart your computer, double-click Photoshp5.0c.exe, you will find that there is no previously listed dialogs. Later I found out, other software, like ACDSEE, Foxmail, OICQ, Sonique, Jet-Audio, etc. Software can also be used directly, Dreamweaver, Firework, Flash4, CuteftP can be used after entering the registration code, and Netants will pop up the dialog box, display "MSIPCSV. EXE Unable to locate the program, enter the point getProcessFlags on the dynamic link library Kernel32. "On the DLL. No matter what you press" OK ", you can open it, because your system does not delete what information, so your operating system is still safe. -------------- ----------------------------------------------
5, delete the problem of NTFS partition?
If you want to delete NTFS partitions, you can use Windows
2000 CD Startup computer Enter the installer, delete the partition, or use fdisk, but fdisk does not delete the NTFS partition in the extended partition, which can be used as the following Debug method:
Debug
A
10
MOV
AX, 0201
MOV
BX, 0100
MOV
CX, 0001
MOV
DX, 0080
int
13
int
20
g = 10
Fly
2CE
2DD
00
A
10
MOV
AX, 0301
g = 10
Qi
(DUG ?? Depressed ing ~~~~~)
-------------------------------------------------- ---
6, how to delete the Win2000's default management sharing (C $, D $, etc.)?
After win2000 is installed, the system will create some hidden shares, you can play at CMD
Net
Share
View them. There are a lot of articles on IPC intrusion on the Internet, I believe that everyone must be unfamiliar with it. To prohibit these sharing
,turn on
Management Tools> Computer Management> Shared Folders> Sharing
Press the right button on the corresponding shared folder, point to stop sharing, but after the machine is restarted, these shares will be reopened again.
If you want to ban the default sharing of% Driveletter% $, you can follow the following locations in the registry
HKEY_LOCAL_MACHINE // System // CurrentControlSet // Services // LanmanServer // Parameters
New Name: AutoShareServer
Types of:
REG_DWORD
value:
0
If you want to ban the default sharing of Admin $, you can follow the following locations in the registry
HKEY_LOCAL_MACHINE // System // CurrentControlSet // Services // LanmanServer // Parameters
New Name: AutoShaRewks
Types of:
REG_DWORD
value:
0
Default shared directory path and function:
C $
D $
E $
The root directory of each partition. Win2000
PRO version, only administrator
BACKUP
Operators group members can be connected, Win2000
Server version Server
OperatROS group can also be connected to these shared directories, admin $
% Systemroot%
Remote management shared directory. Its path will always point to the Win2000 installation path, such as C: / Winnt.
FAX $
Win2000
In Server, Fax $ will arrive at the FAX client.
IPC $
Empty connection. IPC $ sharing provides the ability to log in to the system.
Netlogon
This share is in Windows
2000
Server Net
Login
Service is used in handling login domain requests
Print $
% SystemRoot% / System32 / Spool / Drivers
User remote management printer
-------------------------------------------------- ------------
7. How to let Win2000 directly enter VGA mode
At NT4.0, after installing the operating system, the VGA mode will appear, and Win2000 is not, you can add a parameter / basevideo in the boot.ini file, as follows:
[boot "
Loader]
TIMEOUT = 30
DEFAULT = MULTI (0) Disk (0) RDisk (0) Partition (1) / Winnt
[Operating
SYSTEMS]
Multi (0) Disk (0) rdisk (0) Partition (1) / Winnt = "Microsoft
Windows
2000
Server
/ FastDetect / Basevideo
-------------------------------------------------- -----------
8, Windows
What is the use of the hiberfil.sys file in the 2000 directory? This file is terrible but deletes it.
You must have used the sleep function inside "Power Management" in a certain period. In fact, whether it is sleep, or the STD we have said before, the principle is the same: save the information in the memory in this file when executing, restart Windows
In 2000, I recovered it back. The size of this file is equal to your physical memory capacity. Be sure to delete it, the method only one: cancel sleep function.
-------------------------------------------------- ------------
9, solve small memory installation Windows
2000 problem
If you need to install Windows2000 on a machine that is less than 64MB, but in the default, you must have 64MB of memory to install Windows.
2000
Server, however, it can be bypassed.
First of all, WINDOWS
The 2000 I386 installation directory is copied to the local / network drive. Edit the file i386 TXTSETUP.SIF (extension is SIF!) File. Search RequiredMemory. Edit this line, let you change the minimum memory, but before you change, you must fully realize that you have made everything! EG: RequiredMemory = 66584576. save document.
Install as usual.
Everything OK ... (this method is not suitable for installation with Winnt32.exe, but only) installed with Winnt.exe.)
-------------------------------------------------- --------------------
10, Microsoft's Windows
2000 recovery console
If you use the Windows2000 recovery console, administrators can access 2000 systems from command dialog, replace corrupted files, start and terminate service. When installed, it will add an option to the start menu.
The following operations should be described below:
Start system to windows2000
Insert installation CD
Go to i386 directory from the command line, type: C: /> Winnt32
/ cmdcons
Click "OK" on the confirmation information bar that appears
The file will be copied to the computer, and the new project C: /cmdcons/bootsect.dat= "Microsoft is added to the startup menu.
Windows
2000
Command
Console
/ cmdcons
Complete the information bar appears, click "OK"
Restart your computer, "Microsoft
Windows
2000
Command
Console "is selected, start the Windows2000 to the command line mode.
The system will ask the 2000 installation and its administrator password you want to fix.
When you enter your password, you can type commands, such as taking disable to terminate the service, DiskPart to create and delete many other commands such as partitions. Just type HELP can list a list of all commands.
You can also hit the console directly from the installation CD. From the disc boot system (if your motherboard supports the optical drive start), select Repair and type C to fix it.
If you rename the administrator account, the console can still use it, unless you delete the administrator account. But repair console (Recovery
Console is temporarily unable to work in the domain.
--------------------------------------------------
11, Driver.cab problem
In C: / WinNT / Driver
In the cache / i386 directory, there is a compressed file for Driver.cab, a size of about 50MB.
Windows is stored inside
The benefits of built-in built-in drivers are the benefits of establishing this document. If the system's configuration changes, if new peripherals, etc., Windows
2000 can automatically extract the corresponding drivers from this file for installation, without user inserting Windows
2000 disc. This is a good feature, but for the hard disk space, it is preferred to insert the CD every time in exchange for hard disk space! What's more, for most users, do not change the system of the system. Everyone deletes the driver.cab file as much as possible, releases 50MB of hard disk space.
---------------------------------------------
12, Windows
2000
Server installation network card as a consideration of the route:
At present, the current operating system, such as NetWare, Windows
NT
Server
4.0 and windows
2000
Server et al, usually only supports a route connection of 4 network cards. If more than 4 network cards, excess network cards will not have routing functions, that is, users connected to the network card cannot communicate with users connected to another 4 network cards. So, the number of network cards installed in a server should not exceed 4.
-------------------------------------------------- ----
13. How to join ordinary users into the admin group in the case of the working group?
If you have a regular user account, there is a very simple method to get NT
Administrator account:
First rename the logon.scr under WinntSystem32 to logon.old backup
Then rename usrmgr.exe to logon.scr
Then restart
Logon.scr is the program loaded when starting, after restarting, there will be no previous login password input
Face, but user manager
At this time he has permission to add yourself to the Administrator group. (Xiao Shuai has not done)
-------------------------------------------------- -
14, how to put Windows
2000
ServicePack
3 integrated into Windows
In the installation disk of 2000, this is installed for Windows
2000 integrates service
Pack
3. Don't you have to install it alone?
1, download Windows from the website
2000
SP3, pass w2ksp3.exe
-X command decompresses the service package into a directory C: / W2KSP3;
2, put Windows
The 2000 source installation file is copied to the directory of the hard disk C: / w2kinstall (for the copy of the entire disc);
3. Run C: / W2KSP3 / I386 / update Update.exe
-s: c: / w2kinstall;
4, then install Windows by c: / w2kinstall
2000, put Windows
2000 integrates service
Pack
3, do not have to be installed separately.
Update
The parameters are as follows:
Update
[-u] [- f] [- n] [- o] [- z] [- q] [- l] [- s:
-u
Unattended mode
-f
Forcing other applications shut down when shutdown
NN
Do not uninstall backup files
-o
No prompt to rewrite OEM files
-z
Don't restart after installation is complete
-Q
Quiet mode (no need to participate)
-L
List the patches that have been installed
-s:
Take service
Pack file integrate to
note:
1, the above operations must be all in Windows
Finished in 2000, if you do under other Windows systems, you will receive a prompt.
2, here, after this installed Windows
There is a small problem in 2000, that is, if you run SFC / Scannow Check the protected system file, the program will need you to insert "Windows
2000
Service
Pack3 "CD, this will be a problem, because the CD we make this seems to be unregistered, that is, you can't check the protected system files. So you have to think about it.
3. This has been recorded into an optical disk after the installation file is recorded.
-------------------------------------------------- -
15. You can hide the hard disk partition by modifying the key value in the registry.
Start the Registry Editor, find "HKEY_CURRENT_USER \Software\Microsoft \Windows \currentversion \Policies Hyxplorer", and create a binary key value "Nodrives" in the registry. When the key value corresponding to "NODRIVES" is 01000000, the drive A; the key value is 02000000, the drive B; the key value is 04000000, hiding the drive C ... found the law? Suppose you want to hide the drive letter, ranked n in English letters, then convert 2 (n-1) (N-1) (N-1) to 16-based, this value corresponds to the drive letter to be hidden. For example, if you want to hide the G disk, g is ranking 7, 2 in English, equal to 64, converting the 64 to 16 into 40 So "nodrives" is: "40
00
00
00
-------------------------------------------------- -------
16, in Windows
Remove unwanted components in 2000
Windows
After the 2000 installation is complete, some components (such as components in the attachment) have all been installed. For components that generally users do not use, such as accessories, code conversion, etc. can be deleted. If you want to delete these unwanted components in Windows 98, you can open the Control Panel, by clicking "Add / Remove Programs" Icon, select and delete in the Add / Remove Windows Component tab. But in Windows
This method cannot be deleted in 2000 because there is no such components in the "Add / Delete Windows Components" list. Is there a way to add these components in the Add / Remove Programs list?
---- Introduction to a method that can add these components in the Add / Remove Windows Components list, then remove these unnecessary components, the specific steps are as follows.
----1. Double-click the "My Computer" icon on your desktop, select Tools * "Folder Selection", select "Show all files and folders" in the Advanced Settings option of the View tab. The purpose of this setting is to display hidden folders and files.
----2. Go to Windows
2000 system directory, generally for the winnt directory, then enter the inflicment (that is, C: / WinNT / INF), this directory is an implicit directory, there is a sysoc.inf file in this directory, this file is only 4KB, first back up File, use the text editing software to open this file after the backup is complete, then click the "Edit" menu, select the "Replace" option, enter ", hide" in "Finding Content", and do not lose in "replace", Then click the "All Replace" button to save this file exit.
---- 3. Click Start * "Settings" * "Control Panel", double-click the Add / Remove Programs icon, then click the Add / Remove Windows Component button, open the Windows Component Wizard window, more than 5 in the component Item, such as "COM ", "Distributed
TRANSACTION
Coordinator, "Fax Services", "Accessories and Tools", "Image Processing", etc. (as shown in the drawings), then remove the components from it is removed.
-------------------------------------------------- -----
17, RIS client pre-tiered and runs sysprep.exe
Install Windows with RIS
2000
When Professional can use pre-prices, you must create a client's GUID, how to enter?
A global unique identifier (GUID) that relies on the computer. GUID is usually the MAC address of the NIC. In front of the MAC address of the NIC, add enough forward zero to ensure that the GUID is 32 16-based numbers is a complete GUID. Example 000000-0000-0000-0000-5254AB15C2EE
"52-54-AB-15-C2-EE" is the MAC address of the client network card.
After running sysprep.exe on an experimental machine, you will be prompted to turn off your computer. At this time, it should be noted when you restart your computer. If you still start from your hard drive, you will be installed. So you should choose from to start the computer from the floppy disk or other media, and use a third-party image software to make clones throughout the hard disk or partition. Then distribute the cloned files into each computer, then use the third-party image software to solve the image on each computer, then select the installation from the hard disk.
Before running sysprep, or first familiar with its main switch parameters:
-Sysprep.inf
use
Sysprep.inf
To configure a computer, apply to a computer that clonally configured
-NOSidgen
No new SID number is not generated after the computer is restarted - PNP
Re-detect the PNP device after the computer restart
-Reboot
run
Sysprep
Restart the computer, not shutdown
-------------------------------------------------- -------
18. Precautions when using RIS to install an operating system:
If you start with a NIC, you first guarantee that the client's system BIOS has set the network card to the first startup device. When the client starts, it automatically connects the RIS server. After the connection is connected, the RIS server prompts the user to press the F12 to download the user to install the Smart Wizard, and the user only needs to be repaired when the first installation system or system is damaged. F12, It is usually not used.
If you start with a floppy disk, you will be prompted to press the F12 to initialize the network service. After Press F12, you must remember to remove the startup floppy before the character appears.
-------------------------------------------------- -
19. How to upgrade the NT4 domain to Win2000 domain:
1, NT4's primary domain controller PDC must be used in NTFS file system format, if the FAT16 format will fail;
2, NT4 upgrade is one-way, so there is no way to return to the NT4 environment after upgrading Win2000B3;
3. When doing upgrade planning, you must first back up important information and pre-preparation work, and remove applications that cannot be performed in Win2000B3;
4, first upgrade the PDC and upgrade BDC (before upgrading the PDC, please upgrade the BDC offline, wait until the PDC is fully upgraded to the Win2000B3 domain controller, upgrade the BDC or select the environment that does not upgrade BDC to retain NT4;
5. During the upgrade process, the installer will have three important directories to specify, including Active
Directory's database, log profile, and sysvol directory, make sure the path of the directory is under NTFS partition;
6. After upgrading, the user account, group account and computer account will be retained.
-------------------------------------------------- -
20. Revenue fax in Win2000
First, install a modem that supports faxes normally; after installing the modem, the modem you use will appear in the lower right corner of the taskbar. Due to the default, Win
The 2000 fax machine is only sent without receiving fax, if we want it to automatically receive the fax, you must right-click your modem name, select "Receive" in the pop-up menu; additional computers send fax It is implemented by "print" function, no matter the image or text, so we can pass the content of the fax in Word or other editor, then select "File / Print" menu, select "Fax" Click the "Print" button, "Fax Send Wizard", click "Next", enter the recipient's name and phone number, and then select "Send Now" or "Time Send" according to its own actual situation.
-------------------------------------------------- ----
21, install Windows first
XP installed Windows
Restore the startup menu after 2000
Enter the recovery console and run the command:
FixmbR
C:
FIXBOOT
C:
Copy
X: / i386 / ntldr
C: COPY
x: /i386/ntdetect.com
C: X is the optical drive.
-------------------------------------------------- ----
22, Windows2000
SP3 upgrade failed after failed
Many people install Windows2000
Errors occur when SP3: "AN
Error
in
Updating
Your
SYSTEM
HAS
Occurred ",
After selecting OK, it will be interrupted later, and will not use Windows.
Installer Installs the MSI package. Error information: "The
Windows
Installer
Service
COULD
NOT
Bo
Accessed.
THIS
CAN
Occur
IF
You
ARE
Running
Windows
in
Safe
Mode,
oral
IF
THE
Windows
Installer
IS
NOT
Correctly
Installed .... ".
The reason for this error is Windows
2000
SP3 includes version 2.0.2600.2 version of Windows
Installer, when DCOM's default impersonation
When Level is set to Anonymous, this MSI version cannot run normally. And in W2K
After the SP3 installation fails, the system will remain in the system, even if you re-upgrade SP3, you will not function properly. In order to successfully install SP3, you need to set up the Impersonation of DCOM
Level
for
Identify,
And to delete the residual file /%Windir%/system32/msisip.dll when the installation fails.
DCOM
Impersonation
Level
Setting method:
1.
Run DCMCNFG
2.
If you have some objects that have not registered, the program will prompt you to register.
3.
Enter the DCOM Setting Properties, select DEFAULT
Properties, set Default
Impersonation
for
Identify.
-------------------------------------------------- -----
23, making custom boot floppy disk
1, use Format under pure DOS
A: / s
Handling a floppy disk
2, create file config.sys in the floppy disk, and edit the command line:
Device = oakcdrom.sys / d: mscdxxx
Device = Himem.sys (to load the system information file HIMEM.SYS for Windows, so that the DOS system can run smartdrv.exe)
DOS = HIGH, UMB
FILES = 60
Buffers = 80
3. Create a file autoexec.bat in the plate and edit the command line:
Loadhigh
A: / smartdrv
/ L
A: / mscdex.exe
/ D: MSCDXXX
4, oakcdrom.sys and himem.sys copy to a disk
Note: Command line in config.sys Device = Oakcdrom.sys / D: Mscdxxx and AutoeExec.bat command line: A: /Mscdex.exe
/ d: MSCDXXX is to load the optical drive under pure DOS. The xxx in the MSCDXXX in config.sys and autoexec.bat can be any character, but both must be the same.
-------------------------------------------------- ---
24. Handmade a route in the system and make it permanently curing
"ROUTE"
Add
192.168.50.0
Mask
255.255.255.0
192.168.4.100
But how to make the system automatically load the route each time, it can be added after the parameter -P is permanently cured. After adding a static routing record using the -p parameter, this record is stored in the registry, in the specific location: hkey_local_machine / system / currentcontrolset / services / TCPIP / parameters / PersistentRoutes
-------------------------------------------------- ---
25, Win2000 for the for command application:
Open a DOS window in Win2000, then execute
for
/ L
% a
in
(1,1,254)
DO
Start
/ min
/ low
Telnet
192.168.0.% A
3389
This will expose all open 3389 ports of 192.168.0.x.
After this command is executed, the 254 small windows will be opened in the taskbar. It is recommended to have any not archive, and save it first.
Scan multiple ports of a host, as follows
for
/ L
% a
in
(1, 1, 65535)
DO
Start
/ low
/ min
Telnet
192.168.0.1
% a
This scans 192.168.0.1 ports 1 to 65535 port
Scan all ports of a network segment
for
/ L
% a
in
(1,1,254)
DO
for
/ L
% B
in
(1, 1, 65535)
DO
Start
/ low
/ min
Telnet
192.168.0.% A
% B
This will scan all 1 to 65535 segments of 192.168.0.x paragraphs.
The above command can only be used under Win2000, because / l accumulated parameters are Win2000 to extensions for FOR. Of course, WinXP and Win.NET are available.
Others haven't tried it yet
-------------------------------------------------- -
26, MTU
We know MTU (Maximum
TRANSFER
The Unit maximum transmission unit defines the number of bytes contained in each packet transmitted in the network based on the TCP / IP protocol, which can effectively improve the access speed and stability of the network by adjusting this parameter. In a Windows95 environment, the default setting of this value is 1500 bytes. Since the MTU is set to 576 bytes of routers, the result of the data packet size has caused 1500 bytes of data packets. Slimed into a number of 576 bytes or less packets, causing the system transfer speed to decrease. In order to match the size of the packet, you must regulate the relevant numerical value under the registration.
-------------------------------------------------- -
27, Windows
The location of the serial number in the operating system
Windows
98 installation serial number:
1. Open the registry editor under the premise of entering the operating system, expand
HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion branch, find "ProductKey" string value in the right window, and its key value is the serial number!
2, if you can't enter the operating system, you can view Windows under DOS.
98
Serial number: Start the computer with the boot disk, then enter C: / Windows / Command / Find / L
ProductKey
C: /Windows/system.dat (assuming the C disk is a system disk), you will show Windows after entering the bus.
The serial number of 98.
Windows
2000 installation serial number:
Go to Windows
The 2000 system installation folder, open the / system32 folder, find the winnt $ .inf file, double-click the notepad to open, [userData] section "ProductID =" back quotation string, is the serial number of Windows2000! XP and 2003 are the same.
-----------------------------------------------
28, sys.com
Sys.com Command, this command is specifically used to "transfer" the system from the source disk to the target disk, will copy the system file on the source disk (such as IO.SYS, etc.) to the corresponding position of the target disk, make The target disk can be started separately. When you turn it on, the system will prompt you: Invalid system disk, MS-DOS version does not match the error message, the command.com command is damaged, you can "pass the correct operating system" pass "to your hard disk, such as It turns out that your computer is started from the C drive, then you can type "SYS after starting the boot disk"
C: "You can. After the operation is complete, the system will prompt:" System
", after restarting, it is generally possible to run normally, so it will be the hassle of your reinstall system. Thes command is the most simple means to rebuild the Boot area, or kill the Boot area virus.
(The Boot area here is actually the guiding sector on the activity partition)
------------------------------------------------
29, FDISK hidden parameter switch
Its grammar format is: fdisk / parameters
1, / ACTOK
Do not check if the disk surface has a bad sector: use this parameter to speed up the partition operation.
2, / CMBR
Re-establish the main boot record of the specified disk: its operation is equivalent to / MBR parameters, and the difference is that the disk can be specified.
3, / EXT
Establish an extension partition: Establish an extended partition on the current disk (use logic disk partitions to age)
4, / fprmt
Use of in interactive mode FAT16 or FAT32: When adding this parameter, it is not necessary to support a large-capacity inquiry screen, but inquiry when establishing a new partition, use FAT16 or FAT32 format.
5, / log
Establish disk logical partition:
Establish a logical disk, must be used at the same time as / ext.
6, / logo
Use FAT16 to establish a disk logical partition.
7, / Mbr
Re-establish the main guidance record of the main disk (Master
Boot
RECORD) 446 bytes.
8, / pri
Establish a restrict, and the partition will automatically be set to activate.
9, / prio
Establish the primary partition with the FAT16 format and set to an activation form.
10, /
End FDisk is not restarting the computer: Use it when you use it, restart your computer after changing the partition table.
11, / status
Displays the current disk partition: When the logical partition is not performed on the disk extension partition, the extension partition will not be displayed.
12, / x
Do not use LBA properties: Use it will not produce partitions with LBA properties.
-------------------------------------------------- -
30, completely delete WinMe system restore
1. First click on "My Computer" to select "Properties", in the Performance tab, select File System, and select "Disable System Restore" in the Troubleshooting tab.
2, running regedit, find
HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / VXD / VXDMON / Clear all the keys
3, restart the computer
You can delete the C: / _ RESTORE directory (hidden folder). -----------------------------------------
31, Windows
2000
Bugs
In one gives Everyone
Full
At the end of Control permission, you will create a file at the end of the CONTROL permission, remove the permission of this file, set to Administrator
Full
CONTROL
Only. Then use any ordinary user to log in and enter this everyone.
Full
The Control directory tries to access this file, of course, refuses to access. But you can delete it! This problem is simple, you can pass the File of WinHelp
The instructions of Permission are seen. And more reflect, and a file
Delete
Child's hidden permissions have a relationship. Microsoft's explanation is to ensure that UNIX is compatible. Because the Win2K system is too large, if the permissions between the domains are more complicated, it will be very complicated. Therefore, if there is something that needs to be protected, perhaps use DENY permissions better.
EFS is indeed a very powerful set of encryption systems, because of its power, we have to be cautious and cautious in use. First before the addition and deletion of AD, you must remove all EFS encryption, otherwise this EFS encrypted file or folder will never be opened. This is actually warned when installing or deleting the AD, can be easily ignored by the user. Specific reasons I think is because Local
Administrator and Domain
The SID of Administrator is different, so there is a problem. In addition, when performing Duplicate operation, it is necessary to remove EFS before executing sysprep, otherwise these data will never be read. Another problem with EFS is that it cannot prevent a file from being deleted. That is, as long as a user has permission to enter the directory where the EFS encryption file is located, you can delete it, so you can put it on the folder encryption and setting permissions in the EFS file.
------------------------------------------
32, find the bottleneck of the system
1, find memory bottlenecks
Use the following counter to identify the bottleneck memory resources in the Performance Tool:
(1) SYSTEM /
PROCESSOR
Queue
Length
(2) MEMORY /
Pages / Sec
2, find disk bottlenecks
Use the following counter to identify a bottleneck of disk resources in performance tools:
(1) PhysicalDisk /
%
DISK
Time
with
%
Idle
Time
(2) PhysicalDisk /
DISK
Reads / Sec
with
DISK
Writes / sec
(3) PhysicalDisk /
Avg.disk
Queue
Length
(4) LogicalDisk /
%
Free
Space
Also monitors the memory counter to determine if there are too many memory pagings to make the disk used tensions.
Note: Unlike physical disk counters, the data of logical disk counters is not collected by the operating system by default. To obtain a logical drive or a performance counter data of the storage volume, you must type in the command prompt.
Diskperf
-yv. This results in a disk performance statistical driver for collecting disk performance data to report data of logical drives and storage volumes. By default, operating system uses
Diskperf
-YD
Commands contain physical drive data. Use
Diskperf
For more information on the command, type in the command prompt
Diskperf
- ?.
3, find processor bottleneck
Use the following counter to identify the processor resources of the bottleneck in the performance tool: (1) Processor /
Interrupts / Sec
(2) Processor /
%
PROCESSOR
Time
(3) Process (Process) /
%
PROCESSOR
Time
(4) SYSTEM /
PROCESSOR
Queue
Length
4, find a network bottleneck
Use the following counter to identify network resources with bottlenecks in performance tools:
(1) NETWORK
Interface /
BYTES
Total / Sec, Bytes
Sent / Sec
with
BYTES
Received / Sec
(2) Protocol_Layer_Object /
Segments
Received / Sec, Segments
SENT / Sec, Frames
Sent / Sec
with
Frames
Received / Sec
for
NWLINK
Performance objects, with frame-related counters report zero. Use the object-based counter.
(3) SERVER /
BYTES
Total / Sec, Bytes
Received / Sec
with
BYTES
Sent / Sec
(4) NETWORK
Segment /
%
NetWork
Utilization
---------------------------------------------
33. There are many ways to close the 445 port, but I recommend this method:
Modify the registry, add a key value
Hive:
HKEY_LOCAL_MACHINE
Key:
System / ControlSet / Services / NetBt / Parameters
Name:
SMBDeviceEnabled
TYPE:
REG_DWORD
Value:
0
After the modification, restart the machine and run "NetStat
", you will find that your 445 port is no longer listenging.
--------------------------------------------
34, Windows
Extract.exe and ext.exe in 98
In fact, Windows
The 98 super boot disk also has this command, this already appearing in DOS6.22, originally only a command to decompress the CAB compression package in Microsoft, but its function is not only unzipped, we are more It is to use it to restore the system files in the CDD. (If you can enter the graphical interface, you can of course use SFC, it's more powerful, convenient)
Below is the use parameter and command format of the extract.exe command:
/ Y
No time to override existing files
/ A
Handle all CAB files, starting from the specified first CAB file
/ D
Display the directory of the files contained in the CAB file, not decompression
/ E
Unzip, replace "*. *", To decompress all files
/ L
DIR specifies the location of the decompressed file, the default is the current directory
/ C
Copy the CAB file
When we know that the system files that want to recover can be used when installing the position in the disc, you can use extract.
/ Y
Win98_27.cab
CDFS.VXD command (from Windows
98 Installing the name of the Win98_27.cab compression package in the installation CD). However, if you don't know the exact location at this file, you must first use the extract / d win98 _ *. CAB (here * is a number representing the CAB file package) to view CDFS.VxDG for each CAB file, Trouble. Ext.exe. I just introduced that there is a bit of trouble when extract.exe finds a system file that the path is unstuten, if it combines it with ext.exe, you don't need to know the specific path to the file. However, it is important to note that this ext.exe command is in an ebd.cab compression package, you can't use it directly. Extract must be used first
/ Y
Ebd.cab
The ext.exe command extracts ext.exe in the EBD.CAB compression package to the same directory, now you know the effect of EBD.CAB compression package? .
Use the ext.exe command to quickly restore system files that unknown paths in the disc, type ext.exe command, then "please
ENTER
THE
Path
Windows
Cab
FILES (A :)
_ "When you type of Windows
98 The path where the disc is located, such as "G: / PWIN98", "please" after the carriage return "
ENTER
THE
Name (s) of
THE
File (s)
You
Want
TO
Extract: "When you type you need to find the file name, if you still have cdfs.vxd, you will be prompted after entering the bus." please
ENTER
THE
Path
fo
EXTRACT
Do ("Enter"
for
Current
Directory: "It means that it is necessary to enter the path to be decompressed, such as c: / windows / system", after entering the arrival again, the following confirmation information appears:
THE
Options
You
entered
WERE:
Source
Path
:
G: / PWIN98
File (s)
TO
EXTRACT
:
CDFS.VXD
Destination
Path
:
C: / windows / system
IS
THIS
Okay? (y / n)
:
After "Y", the ext command quickly started, but it can not only find the detailed location of the file, but it can automatically decompress the file until the file is released to the specified path, and the speed is extremely fast.
-------------------------------------
35. Is there a tool to drop the dynamic disk back to the basic disk?
I have repeatedly trying to work and succeeded:
Install Recovery
Console, enter the recovery console, delete one or two unimported volumes with the diskpart command, restart, found that the data that has been changed back to the base plate, the data that is not deleted is intact
(Xiao Shuai has not done !!!!!!)
-----------------------------------------
36. Win2000 unconnected network is unavailable solution
Win2000 has such a feature. When our network cable is broken due to various reasons, the system will prompt your network cable without a connection. You will make your address no longer force, causing some of the only friends who don't have a friend without even network. Can't do it. A solution is given now, but it does not guarantee a certain success (which is unsuccessful on a large part of the NIC. This function of Win2000 is called "Media" (Media "
Sense)
First, we can ban this feature through the registry: HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / TCPIP / Parameters There is a keyword for disabledhcpmediasense, DWORD type (if you don't have yourself), default is 0 Open the detection function, set it to 1, turn off the probe. After the modification is complete, restart the computer, then you remove the network cable, though the system is still not connected, but the IP bound to the NIC is still tube.
Second, you can make a back rotator, 1326 even deceived can also
Specific connection method:
Crystal head network card one end: orange white, orange, green white, blue, blue white, green, brown, brown
The other end does not pick up RJ-45, directly connect 13, 26, ie orange white, orange, green, other 6 lines do not use 理 理
---------------------------------------
37, NT does not recognize the hard disk, can only identify the solution of 8G hard drive
Replace the original file in the i386 directory in the NT installation disc, then run the installer or replace the copy with these two files after running the installer or after the NT replication file is used to the hard disk. On the $ ** $ file on the C drive, you can install NT4.0 on a large capacity hard drive without re-adjusting the partition.
----------------------------------------
38. How do I use the netsh command to configure COPY on another IAS?
Netsh
AAAA
Show
Config
>
Path / file.txt
Netsh
EXEC
File.txt
This should be
Can be used below 2k3
Netsh
AAAA
DUMP
> file.txt
-----------------------------------------
39, in Win2000
Can I install routing and remote access components to make it remote login server?
2K
Pro is a RRAS function, but there is only MMC without Server
Console, 2K
PRO's RRAS only done a service, just put the management tool -> Serving Routing
and
REMOTE
Access service starts in the line (not started by default), then you can see "Incoming Connection" in the network neighbor, in the incoming connection, can configure RAS customers, VPN customers, etc., 2K
PRO only supports three remote users, RAS, VPN, and direct connections to accept one customer, together three customers.
----------------------------------------
40, RRAS
Console
Displays
AN
"In"
Routing
Interface
After
You
INSTALL
Routing
and
REMOTE
ACCESS
Services
(RRAS),
AN
Interface
Named
"In"
Appears
Under
Routing
Interfaces
in
THE
Routing
and
REMOTE
ACCESS
Services
Management
Console.
THIS
Interface
IS
part
Of
RRAS
and
Represents
all
REMOTE
ACCESS
Services
(RAS)
DEVICES.
All
RAS
Clients
ARE
part
Of
THIS
Interface.
THE
"In"
Interface
Should
NOT
Bo
deleted
-----------------------------------------
41, how to add saving time saved in the ARP buffer project?
The time default value saved in the ARP buffer project is two minutes, and it can be changed below:
Open the Registry Editor;
Find hkey_local_machine / system / currentcontrolset / service / tcpip / parameters
Look at "Double Word Value" under "New", enter the name ArpCachelife, enter the number of seconds you want to save;
Exit the editor and restart your computer.
-------------------------------------
42, modify the password of the domain controller?
Erd
Commander
After the 2002 Making ISO CD launched the DC local password, the DC is the hand to come. Use the local administrator password to log in this machine (directory recovery mode), then configure the power-on script of the local security policy, assume your domain administrator The account is admin, the content of the boot script should be
Net
User
admin
12345678
Save to the admin.bat file and then restart. Then your DC's administrator password is changed to 12345678. Everything will be done.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
43, disable off
XP text service? ?
Removing CTFMon.exe from MSConfig does not disable text services. Because the text service will start automatically when you start a pro program. To prohibit text services, follow these steps:
Step 1: Delete Chinese Optional User Enter Method
For Windows
2000 system, delete this feature:
1.
Exit, so Office
program.
2.
Click Start, click Setting, and then click Control Panel.
3.
In the Control Panel, double-click Add / Remove Programs.
4.
In the current installer list, select Microsoft
Office
XP products. Click to change.
5.
In the Maintenance Mode dialog box, select Add or Remove Components, then click Next. The dialog box to select the installation option is displayed.
6.
Click the plus number before the Office sharing function.
7.
Click on the icon of the Chinese optional user input method to select not installed.
8.
Click Update.
Step 2: Remove the optional user input from the text service:
1.
Click Start, click Setting, and then click Control Panel.
2.
In the control panel, double-click the text service.
3.
In the installed service list, except English (US), one by one deletes the remaining input method.
Step 3: Run Regsvr32
/ U
Log out of MSIMTF.DLL and MSCTF.dll files.
1.
Click Start -> Run.
2.
In the Run dialog, type the following command:
Regsvr32.exe
/ U
MSIMTF.DLL "
(Excluding double quotes)
3.
Click OK.
4.
Repeat 1 to 3 steps for MSCTF.dll files.
After prohibiting the text service, you can add other input methods as before.
-------------------------------------------------- -
44, what is RPC? ?
Inter-process communication (IPC) is a communication technology used by programs and processes run between multitasking operating systems or networking computers. There are two types of process communication (IPC). Local Process Call (LPC) LPC is used in multi-tasking operating systems such that tasks running simultaneously can be sessions. These tasks shared memory space allows tasks to synchronize and transmit information.
Remote Process Call (RPC) RPC is similar to LPC, just working online. RPC begins to appear in a computer that runs a SUN microsystem and HP's running UNIX operating system.
By IPC and RPC, the program can utilize other programs or computer processing processes. Client / Server Mode Calculation The remote process calls with other technologies such as messages, as a mechanism for inter-system communication. The client executes its own task, but provides backend file services by the server. RPC provides the client to provide a communication mechanism for the rear server application service, as shown in Figure R-4. If you want the client / server application to be a separate program, the server can run the data access section because it is recently separated by the data, and the client can run the data representation and the front end portion interact with the user. Thus, the remote process call can be seen as part of the part of the split program through the network. LPC is sometimes also known as coupling mechanism.
Use this method to divide the program, do not need to copy the entire database or most of its programs to the user system when the user wants to access the data. In fact, the server only processes the request, even only performs some data calculations, and sends the resulting result to the user. Because when the data is placed in one place, the database synchronization is easy to implement, so many users can access the same data simultaneously.
The distributed computing environment is a computer cluster connected by a communication system-network connection. It is easy to see this network as a computing platform. If it is equal, any computer can be a client or server. Some processing tasks can be divided into separate runners in parallel on different network computers, while independent programs are handed over to computer processing that best suits this task. This strategy can use computer idle resources to improve network efficiency. A typical enterprise network includes many heterogeneous computer systems that run different operating systems.
-------------------------------------------------
45, how to prohibit anonymous users from connecting your IPC $ sharing?
We can implement it by modifying the registry
Key: HKLM / System / CurrentControlSet / Control / LSA
Name:
Restrictanonymous
TYPE:
REG_DWORD
Value:
1
|
2
Note: When the value is set to 1, anonymous users cannot list the host user list; when the value is set to 2, anonymous users cannot connect your IPS $ sharing, not recommended 2, otherwise you may cause some of your services that you can't Start, such as SQL
Server ...
-----------------------------------------------
46, Regedit.exe parameters:
Filename
Import
.reg
File entering registry
/ s
Import
.reg
File Enterprise (quiet mode)
/ e
Export registry file
Example: regedit
/ e
FileName.Reg
HKEY_LOCAL_MACHINE / SYSTEM
/ L: System
Specify
System.dat
/ R: User
Specify
User.dat
/ C
compression
[file name]
(Windows
98)
-------------------------------------------------- ----
47, ". REG" file full Raiders
In order to facilitate the modification of the registry, we will make some scripts, but whether it is an INF file or a VBS script, I think it is only the .reg file is the most convenient. About the operation of the registry, common is to create, modify, delete. --create
Create a division, one is to create a child (Subkey)
Note: If you are not very clear about the naming of the registry, you can check the registry naming standard manual (http://www.sometips.com/tips/registryhack/204.htm)
We create a file, the content is as follows:
Windows
Registry
Editor
Version
5.00
[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]
Then execute this script, you have created a child name "Test4Adam" in HKEY_LOCAL_MACHINE / SOFTWARE /.
The other is to create a project name
The file format is a typical file format, which is consistent with the file format you exported from the registry:
Windows
Registry
Editor
Version
5.00
[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]
"TEST1" = "adam"
"TEST2" = HEX: 61
"TEST3" = dword: 00000064
Test1 type is "String
Value
Test2 type is "binary
Value
Test3 type is "DWORD
Value
Note: If there is no Test4adam in your registry, the script will create the child for you.
--modify
Modifications are relatively simple, just export you need to modify, then modify it with Notepad, then import it, I will not repeat it here.
--delete
Let's first tell the delete a project name, we create a file as follows:
Windows
Registry
Editor
Version
5.00
[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]
"TEST1" = -
Execute this script, "Test1" under HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM is deleted;
Let's take a look at the delete one child, we create a script as follows:
Windows
Registry
Editor
Version
5.00
[-HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]
Execute this script, HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM has been deleted.
-------------------------------------------------- --------
48, Power
Users
Group:
Power
Members of the user group can modify the account of non-administrative users, start the service that is not started by default (note, a power
The member of the User Group cannot stop a system service), which cannot modify the administrator's account password, install the system service or modify the operating system file.
-------------------------------------------------- -----
49, remote backup and restore:
The corresponding operating system path in the boot.ini file on the remote computer is added to the / safeboot: dsrepair command option, boot the remote machine to the recovery mode, then use the planned task or the AT command to implement backup and restore. Implementing remote restarts You can use the corresponding management programs in 2000, XP, 2003. -------------------------------------------------- --------
50, RAS
Client gets DHCP
Options:
THE
MOBILE
Users
Receive
THEIR
IP
Configurations
From
THE
REMOTE
ACCESS
Server, But
the
ARE
NOT
Able
TO
Receive
Any
DHCP
Options.
In
ORDER
TO
enable
this,
a
DHCP
RELAY
Agent
Must
Bo
Configured
on
THE
REMOTE
ACCESS
Server.
THIS
Will
Allow
DHCPINFORM,
Which
ARE
Used
TO
Obtain
Windows
Internet
Name
Service
(Wins)
and
Domain
Name
SYSTEM
(DNS)
Addresses,
Domain
Name,
DEFAULT
Gateway
oral
Other
DHCP
Options
ORIGINATING
From
THE
DHCP
Server,
TO
REACH
THE
MOBILE
CLIENTS.
-------------------------------------------------- --------
51. Use the netsh command to copy the IAS settings:
REMOTE
ACCESS
Policies
ARE
NOT
stored
in
Active
Directory;
the
ARE
stored
Locally
in
THE
IAS.MDB
File.
TO
Copy
THE
IAS
CONFIGURATION
TO
Another
Server
WE
Must
Type
Netsh
AAAA
Show
Config
AT
THE
Command
PROMPT.
THIS
Stores
THE
CONFIGURATION
Settings,
including
Registry
Settings,
in
a
TEXT
File.
THE
Path
CAN
Bo
RELATIVE,
Absolute,
oral
a
UNC
Path.
WE
Must
THEN
Copy
THE
File
WE
created
TO
THE
Destination
COMPUTER,
and
AT
a
Command
Prompt
on
THE
Destination
COMPUTER,
Type
Netsh
EXEC
A
Message
Will
Appear
Indicating
WHETHER
THE
Update
WAS
Successful
oral
NOT.
-------------------------------------------------- -------
52, DHCP User Class:
User
Classes
Allow
DHCP
Clients
TO
Differentiate
Themselves
BY
Specifying
a
User
Class
Option.when
Available
for
Client
USE,
THIS
Option
Includes
a
User-determined
Class
Id
That
CAN
Help
TO
group
Clients
Of
SIMILAR
CONFIGURATION
Needs
Wtem
a
SCOPE,
Such
AS
providing
a
SHORTER
Lease
Time
for
Portable
Computers
That
Move
FREQUENTLY
oral
USE
REMOTE
ACCESS
OFTEN.
Typically
a
DHCP
Server
Will
Bo
Used
TO
Distribute
Different
Options
That
ARE
Specific
TO
THE
Needs
Of
CLIENTS.
TO
CONFIGURE
a
User
Class
Lease
Time
WE
Must
Open
THE
DHCP
Console,
SELECT
THE
DHCP
Server,
Open
SCOPE,
Right
click
Scope
Options,
SELECT
CONFIGURE
Options,
SELECT
THE
Advanced
Ban,
SELECT
ApproPriate
Vendor
Class
and
User
Class
(= Windows2000LaptopComputers
in
THIS
Example,
SELECT
051
Lease,
and
ENTER
Lease
Time: 14400
(4
Hours
=
14400
SECONDS)
-------------------------------------------------- -------
53, mobile DHCP database:
TO
Move
THE
DHCP
Database
WE
Must
First
STOP
THE
DHCP
Service
on
THE
Old
Server,
BACK
UP
THE
Registry
Key
HKLM / Software / Microsoft / DHCPServer / Configuration,
and
INSTALL
DCHP
on
THE
New
Server.We
Must
THEN
STOP
THE
DHCP
Service
on
THE
New
Server
and
RESTORE
THE
Registry
Key
From
THE
Old
Server
Onto
THE
New
Server.
THEN
WE
Must
Delete
THE
Contents
Of
C: / WinNT / System32 / DHCP
on
THE
New
Server,
Copy
THE
Database
File
DHCP.MDB
From
THE
Old
Server
Onto
THE
New
Server
BUT
NOT
THE
TRANSACTION
Logging
(* .Log)
and
Checkpoint
(* .Chk)
Files
and
Start
THE
DHCP
Service
on
THE
New
Server.
Finally
WE
Must
Reconcile
all
Scopes
on
THE
New
Server
TO
SYNCHRONIZE
THE
Database
WITH
THE
Registry.
-------------------------------------------------- ------ 54, DNS aging recording function:
Previous
Versions
Of
Microsoft
Operating
Systems
That
DO
NOT
Support
Dynamic
Domain
Name
SYSTEM
(DNS)
Require
That
a
Static
DNS
Entry
USE
a
Static
IP
Address
WHENEVER
Possible.
IF
WE
UPGRADE
TO
Microsoft
Windows
2000
and
Our
Present
DNS
Server
IS
Windows
2000,
THE
IP
Address
Will
Remain
THE
Same, But
THE
DNS
"A"
Record
Remains
STATIC.
However,
THE
Static
Ptr
Record
IS
Converted
TO
a
Dynamic
Entry
and
IS
Subject
TO
THE
aging
.
THE
Windows
2000
Dynamic
Domain
Name
SYSTEM
(DDNS)
Client
Does
NOT
Overwrite
AN
existing
"A"
Record
IF
THE
IP
Addresses
Match.
TO
Convert
Static
entries
TO
Dynamic
ENTRIES,
WE
Must
USE
THE
/ AGEAllRecords
Option
in
THE
DNSCMD.EXE
COMMAND.
-------------------------------------------------- -------
55. A useful command in nbtstat:
NBTSTAT
-Rr: releases
Names
Registered
WITH
a
Wins
Server
and
THEN
Renews
THEIR
Registrations.
THIS
Will
RELEASE
Obsolete
Records
and
all
Wins
Clients
Will
get
Registered
Properly
Again.
-------------------------------------------------- -------
56, DNS FAST
zone
TRANSFER
Format:
BY
DEFAULT,
all
Windows-based
DNS
Servers
USE
a
FAST
zone
TRANSFER
Format,
Which
Uses
Compression
and
CAN
Include
Multiple
Records
per
TCP
Message
during
a
Connected
TRANSFER.
THIS
Format
IS
ALSO
Compatible
WITH
More
Recent
Berkeley
Internet
Name
Domain
(Bind)
-BASED
DNS
Servers
That
Run
Versions
4.9.4
and
Later.
-------------------------------------------------- -------
57, 98/2000 / xp / 2003 issue of XP
Some people say that enabling Guest, some people even install NetBeui et al. Since then, you will summarize the correct statement, pay attention to the 98/2000 / XP / 2003 access to XP / 2003 user authentication issues with normal network connection. First of all, I can't access the guests why you cannot access.
1. By default, XP
Disabate GUEST account
2. By default, XP local security policies are prohibited from accessing from network access.
3. By default, XP's local security policy - User Rights Assassin, "Empty Case Users can only log in to the console" are enabled, that is, any account of the empty password cannot be locally logged in, Guest Default empty password ···
So, if you need to use the guest user to access XP, you want to perform the above three settings: Enable guest, modify the security policy allows guest to access, disable 3 security policies or give guests.
Sometimes it will encounter another situation: When accessing XP, the username in the login dialog is gray, which is always a guest user, and cannot enter other user accounts.
The reason is that this security policy is in the Strange (Management Tool - Local Security Policy - Security Options - "Network Access: Sharing and Security Mode for local accounts"). By default, XP's access method is the way "only guest", then you access it, of course, you cannot enter other user accounts for GUEST.
So, accessing the easiest way to access the XP is: No need to enable guest, only modify the above security policy is "classic". Other systems access XP can enter account information.
As for accessing 2003, the 2003 is disabled by default, but there is no XP
The annoying default contradictory guest approach is shared, so you can directly enter your username password access.
-------------------------------------------------- --------
58, IPX / SPX
Frame
TYPE:
NetWare
3.11
Uses
THE
802.3
Frame
TYPE.
NetWare
3.12
and
ABOVE
Uses
THE
802.2
Frame
TYPE.
THIS
NetWork
HAS
Both
NetWare
3.11
and
NetWare
4.1
Servers,
SO
Both
Frame
Types
Must
Bo
INSTALLED.
Installation
Of
Multiple
Frame
Types
on
a
Windows
2000
PROFESSIL
Requires
editing
Of
THE
REGISTRY,
Specifically
Add
Both
Types
TO
THE
Multi-string
Value
PKTTYPE
in
HKLM / System / CurrentControlSet / Services / NWLnkipx / parameters / adapters /
WHERE
IS
THE
NetWork
Adapter
Identifier.
-------------------------------------------------- --------
59, four coding methods:
ANSI: System preset standard text storage format. ANSI is American
National
STANDARDS
Abbreviation for institution. It was established in 1918 and a voluntary organization with more than 1300 members, including all large computer companies. ANSI is specific for computers
Industrial establishment standards, it is a very important standard in the world. Unicode: The integration of all major directive files in the world, including the public segments used in business and personal computers. When you use the Unicode format to store files, you can use the Unicode Control Character Assistment Description Language Coverage, such as Arabic, Hebrew. use
The system will prompt you to select Unicode encoding in "Save As" in "Notepad" in "Notepad". These characters will not be lost. Need to remind everyone, part of Windows
The 2000 font cannot display all Unicode characters. If some characters are missing in the discovery file, simply change it to other fonts.
Unicode
BIG
Endian: The sequence of text bits (storage units) in the Unicode file established on the BIG-Endian processor (such as Apple Macintosh), opposite to the text bitmuncing order of the files established on the INTEL processor. The most important bit group has the lowest address and will first store a larger end of the text. To enable users of such computers to access your files, select Unicode
BIG-Endian format.
UTF-8: UTF means universal word set conversion format (Universal
Character
Set
Transformation
FORMAT, UTF-8 is the 8-bit form format of Unicode. If you use only important information of 8 bitmines within the same location in group, you can choose the UTF-8 format.
-------------------------------------------------- -----
60, CA certificate revocation:
Revoking
a
Certificate
IS
a
Two
STEP
PROCESS
First
WE
Must
Revoke
THE
Certificate
and
THEN
Create
(this
IS
DONE
Automatically)
and
Publish
THE
CERTIFICATE
Revocation
List
(CRL).
Finally,
THE
CERTIFICATE
Revocation
Lists
(CRLS)
Must
Bo
ACCESSIBLE
TO
all
Users.
IT
Should
Bo
PUT
in
a
NetWork
Share
and
THE
Users
Should
Have
ApproPriate
(READ)
Permission
TO
THE
Share.
-------------------------------------------------- -----
61, hide your computer in the network neighbors, 2000 absolutely available
There are two ways:
A. Edit Registration:
HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / LANMANSERVER / PARAMETERS
The value of Hidden is set from 0 to 1, which is the dword type.
B. Run as follows:
Net
Config
Server
/ hidden: yes
This user may connect to your computer but cannot see you in the network neighbor.
-------------------------------------------------- ---------