2008年4月30日星期三

In ADSL dials the wrong code fair of questions and answers of appearance

The author is a system of wide band of the company of China Netcom maintenance Yuan, the various obstacle contacts for ADSL are more in, dial for ADSL the wrong code of appearance is as follows through seeking information arrangement:

Inspect power source and jumper; Inspect network attribute, the agreement related to RasPPPoE whether correct installation and correctness Bang decide ( the agreement that is related ), inspection net card whether appearance? Number or! Wail , it is Enable to install it; Inspect to dial the attribute of connection , whether the equipment of connection has used a equipment of " ISDN channel-Adapter Name( xx) ", this equipment is a empty equipment , replaces it or new founding if having used the PPPoE equipment that cancels it and selects correctness to dial connection

How to use ipconfig to order

When ipconfig - - will use IPConfig, does not bring any parameter to choose item , so, it shows IP address and son net for every interface that had been deploied to cover yard and is short of province gateway value.

Ipconfig / all - - when use all chooses item, IPConfig can show for DNS and WINS server that it has deploied just the use wanted additional message( as IP address etc.), and show built-in in the physical address of local net Ka-Zhong( MAC). If IP address is rented from DHCP server, IPConfig the IP address of show DHCP server and rent the date that address estimates to become invalid ( the related content concerning DHCP server please detail sees inquiry or the books of other concerning NT server your network management).

Ipconfig / release and ipconfig / renew - - this is two add to choose item , can only take effect on renting the computer of its IP address to DHCP server. If you input ipconfig/release, so all interface rent IP address deliver to again DHCP server( return IP address). If you input ipconfig/renew, local computer is tried get in touch with DHCP server , and rent a IP address. Please pay attention , the most condition cards of go off-line will be the identical IP address that gives and gives before again.

If you use is Windows95/98, so, you should be accustomed to more to use winipcfg instead of ipconfig, because it is a graph user interface, and the ipconfig and message shown are identical, and also offer to issue and update development IP address choose item. If you have purchased Windows NT Resource Kit( NT resource pack), it is wntipcfg that so, Windows NT has also contained the name of a graph replacing interface and this utility program, it is similar with winipcfg of Windows 95 / 98.


Total parameter brief introduction( may

Ipconfig/all: Show the detailed message

Ipconfig/release: DHCP customer end

Ipconfig/renew: DHCP customer end handwork

Ipconfig/flushdns: Clear away local

Ipconfig/displaydns: Show local

Ipconfig/registerdns: DNS customer end handwork

Ipconfig/showclassid: Show the DHCP classification

Ipconfig/setclassid: Install the DHCP

About VPN wrong 800

First, opening to begin menu operation input cmd confirmation
OK joins again do not disappointed

Wrong
1, IP fills
2 has too
3, use passes
4, Routing and Remote Access and Protected Storage in service
5, weight starts computer, delete
6 opens beginning - operation - input cmd, inputing order ipconfig

Wrong 800: Can not establish VPN connection

Delete the connection
800 VPN server wrong

Connection VPN tunnel occurs " wrong 800:

1. What inspect the use " the host computer

Since VPN tunnel needs are defended regularly,

2. You place network and our

Please in try changes disposition " IP address

3. Temporary fault, probably is since

Or it is aroused that the name of domain name carries out analysis, may make to finish drill to do: Begin operation - > of - > to open: Cmd- > determines that conducted order carries out VPN connection again after ipconfig / flushdns to try.

4. Because of disposition exception

But deploy since systematic built-in fault will
Processing technique is to delete the

5. It is consistent to

6. The regular installation of fire wall on your

7. If have the user of installation

Additionally

Since the system of Windows2000 / XP / 2003 is short of province condition, has started IPSec function , therefore should prohibit IPSec function when initiating VPN request , need to change registered table

Windows Registry Editor Version5.00

[ HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ RasMan \ Parameters
" it is "ProhibitIPSec""=dword:

The weight after

2008年4月29日星期二

Computer is mentioned quickly

Accelerate

May carry out according to following
1, it is antivirus to
2, the operation scrap arrangement
3, clear away to start item: Beginning
4, accelerate start and barrier machine speed: Start registered table editor ware , find HKEY_CURRENT_USER \ \ Control Panel \ \ Desktop \ \, worth string [ HungAppTimeout ] the data change of number value is [ 200 ], worth string [ WaitToKillAppTimeout ] the data change of number value is [ 1000 ]. Is in HKEY_LOCAL_ACHINE \ \ System \ \ CurrentControlSet \ \ Control additionally , worth string [ HungAppTimeout ] the data change of number value is [ 200 ], worth string [ WaitToKillServiceTimeout ] the data change of number value [ 1000 ].
5, close voluntarily to stop response program: Start registered table editor ware , find HKEY_CURRENT_USER \ \ Control Panel \ \ Desktop, worth string [ AutoEndTasks ] the data of number value alter is [ 1 ], start again can; Barrier machine close voluntarily to stop response program: Find HKEY_USERS \ \.DEFAULT \ \ Control Panel \ \ Desktop( or HKEY_CURRENT_USER \ \ Control Panel \ \ Desktop), when right surface window will [ AutoEndTasks ] the data of number value alter is [ 1 ], write off or start again.
6, clear away the DLL file that not used in memory: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ SOFTWARE \ \ Microsoft \ \ Windows \ \ CurrentVersion \ \ Explorer, a creation DWORD value [ AlwaysUnloadDLL ] set up its value is [ 1 ]. Pour: If set up its value is [ 0 ] represent this function of out of service.
7, accelerate
( 1) family edition: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ SOFTWARE \ \ Policies \ \ Microsoft \ \ Windows, creating a name is [ Psched ] item, when [ Psched ] right surface window new Dword value [ NonBestEffortLimit ] set up its value is [ 0 ].
( 2) business edition: [ beginning ] [ operation ] input [ gpedit.msc ], open local computer strategy, select in left window [ computer disposition ] [ management shuttering ] [ network ] [ QoS data pack manages program ], in right window, click double " restrict the insurable bandwidth that reserves " , select " have started using " and seting up " bandwidth restriction( %) " for 0 applications determine , weight starts can.
8 , fast browse local area network Luo share: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ Software \ \ Microsoft \ \ Windows \ \ Current Version \ \ Explorer \ \ RemoteComputer \ \ NameSpace, when this , have { D6277990-4C6A-11CF-8D87-00AA0060F5BF } item, delete it to fall , start computer again, Windows XP does not inspect the task intended , speed rises obviously.
9 using L2 Cache of CPU, accelerate overall efficiency: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ SYSTEM \ \ CurrentControlSet \ \ Control \ \ SessionManager \ \ MemoryManagement, when right window, worth Dword [ SecondLevelDataCache ] the data change of number value is the value of decimal numeral similar to CPU L2 Cache: For instance: L2 Cache of P4 1.6 G A is 512Kb, the data change of number value worths for decimal numeral [ 512 ].
10, it is starting computer
Start registered table editor ware , find HKEY_LOCAL_MACHINE SOFTWARE Microsoft Dfrg BootOptimizeFunction, worth string
11, memory
Windows XP in have some choose item may optimize memory performance, them all under registered table location: HKEY_LOCAL_MACHINE \ \ SYSTEM \ \ CurrentControlSet \ \ Control \ \ SessionManager \ \ Memory Management.
Prohibit to use memory page surface
Under normal condition, XP meeting writes the segment in memory into hard disk , may prevent its this , let data remain to store in , so promote systematic performance. The user who possesses 256 m above memories just uses this installation well. The name of this installation shouts [ Disable Paging Executive ], the value of its since [ 0 ] alter is [ 1 ] may prohibit that memory page surface is managed.
Promotion system stores slowly: [ Large System Cache ] key value since [ 0 ] alter is [ 1 ], Windows XP will store the systematic memory all distributions besides 4 m slowly to file system, this signifies the kernel of XP can store in in operation, raise systematic speed greatly. In the 4 m that leave , it is to do the time that needs under certain condition that magnetic disc stores slowly to store , it is some that XP can still distribute. Generally speaking, this optimization can make systematic performance get considerable promotion, but also possible can make some application program performances reduce. There is the memory more than 256 m, just good activation Large System Cache.
12, queue up prior order for IRQ suspension request: The major parts of computer have installed IRQ suspension number. Through modifying the prior order of IRQ request, may reach optimization purpose. Major optimization is the systematic clock of / CMOS of real time for elephant, it promotes performance through mainboard. Determine to want what package to get higher performance first , find this hardware IRQ suspension number. Open systematic attribute in, choose "hardware" chooses card, click the button " equipment organizer", right key click will check the package of No. IRQ, select "attribute" , click "resource" to choose card. Seeing equipment the IRQ suspension number of use. Under notes, suspension number and operation are registered to show editor ware , spread out HKEY_LOCAL_MACHINE \ \ System \ \ CurrentControlSet \ \ Control \ \ PriorityControl, establishment name is [ IRQ Priority ]( " " is specific IRQ suspension number) DWORD value, and seting up its value is [ 1 ]. The IRQ suspension number as the systematic CMOS clock of real time is 8, will establish value name is [ IRQ8Priority ]. After starting again, will discover the package performance optimized just to rise. Strong suggestion uses this method optimization system CMOS real time clock. May also raise many IRQ suspension priorities, however, it is good that effect sinks , may cause system to be not steady. Will withdraw this optimization installation to eliminate , worth the registered table key established just now to delete fall can.
13, barrier debugs ware Dr. Watson: Open volume table , find HKEY_LOCAL_MACHINE \ \ SOFTWARE \ \ Microsoft \ \ Windows NT \ \ CurrentVersion \ \ AeDebug, worth string [ Auto ] the data of number value alter is [ 0 ], pressing F5 to refresh make installation come into effect , cancel its operation.
14, close the special efficacy in systematic attribute, this mentions fast effective prescription yes. Beginning control face plate system high-grade performance installation in visual effect, installing to adjust for optimum behavior determine can. Such tabletop will and win2000 is very similar, as the blue window of liking XP , may draw on the dozen " on window and button, use visual pattern".
15, manage file with Windows commadner + Winrar, the ZIP support of Win XP is also not as good as for linking chicken rib, because no matter need to not need , start system opens zip support , the system resources that is few originally has again been few to divide, beginning operation, knock into "regsvr32/u zipfldr.dll", then the confirmation of carriage return can, successful sign is to arise to refer to window: Zipfldr, the hit the mark of Dll UnrgisterServer in dll.
16, open DMA: In equipment organizer, select IDE ATA / ATAPI controllers, go to the inside of Primary / Secondary IDE Channel is high-grade to set , will have pass on pattern to set for use DMA( if feasible words) , system will open DMA help( should also want to set up first to support DMA in BIOS) voluntarily.
Save the method
1, delete systematic spare file: Beginning
2, delete driver under the catalog of % windows% driver
3 if have not seen the habit of help, the thing
4 after dozen passes patch( or upgrade), will discover that %
5 , will fictitious memory file pagefile, sys puts the other plate that coils to system: Control face plate system performance - high-grade fictitious memory change, the notice "installation" of main points can just come into effect.
6, de-installation does not use package frequently: Use search / replacement function with notebook modification %windows%\ \ inf \ \ sysoc.inf , input in seeking frame, hide, it is ", " to replace completely. Is so, have , hide has removed , storing plate run again after quiting " add - delete program " in, will see that" add / to delete Windows package " is a lot of to choose item; Delete the thing that game and yard table etc. not use.
DeleteWindows \ \ imeTake off do not need
9, close system to restore , it will occupy the greater space of hard disk, use mouse right healthy click tabletop " go up my computer ", select "attribute" , find " system reduction ", choice " close system on all driver to restore.
10, close dormancy: This function will occupy the space of hard disk of 4 or 5 100 signs. Close method: In tabletop blank place right attack according to "attribute" appearance " show attribute " window choice "screen saver" page surface according to the button " power source( O)" of right next angle appearance " power source chooses attribute " window choice "dormancy" page surface will " start using dormancy( H) " preceding hook removes , determine all the way can.
11 , move systematic and user temporary file besides system plate: On tabletop, it is right to attack " my computer" , selects "attribute" , selects in the dialog box of " systematic attribute " that sprung " high-grade " to choose card , and then clicks the button " environmental variable" , springs the dialog box " environmental variable" , selects "Temp" under" the user variable of XXX" to click the button of " editor " again, in the dialog box of " "editor" user variable " that sprung worth variable from acquiesce in " C: The user well-known /Temp of / Documents and Setting / " modify is " X: /YYY/Temp "( X: Representing you need to move the plate of the plate that arrives to be consistent , the YYY superior who represents " Temp" file) then some "definite" button return" environmental variable" dialog box, select "Tmp" again, according to above-mentioned identical method modifying its corresponding value is " X: /YYY/Temp ". According to same method modifying the following variable "Temp" " system is variable" and the value of " Tmp " is " X: /YYY/Temp ", then, all the way definite return tabletop starts machine again, the modification done can come into effect. Suggestion each separate a time to delete the file in this file.
12 , move the file of Temporary Internet Files besides system plate: Control face plate Internet chooses item routine Internet temporary file installation move file. Suggestion each separate a time to delete the file in this file.

Let the 15 that
Let the 15 that

It is every common worry of computer fan that suspicion computer starts to slow too, it will soon be the common wish of all to let computer start , me has summarized in using computer process to accelerate computer the 15 that starts speed type, share with you.

The optimization

The first page installed in bios we enter "advanced bios features" to choose item , move cursor "frist boot device" chooses item, according to " pageup " and " pagedown ", select , acquiesce in that value is " floppy", this expression starts system meeting first since in soft Qu read to take to start message , this meeting extended machine start time, reducing is short soft Qu life-span. So, we will choose "hdd-0", directly start from hard disk, so start rapid first-class some seconds of. Is other, choose "disabled" for the suggestion of " above1mbmemorytest " in bios installation, suggest to select enabled for "quickpoweronselftest".

When "advanced chipset features" the acceleration of installing for machine son in item influence is very big, ask all to add to note. Alter "bank0/1dram timing" from "8ns/10ns" to" fast" or "turbo". " turbo" but not quite stabilize quickly than "fast" , suggest to choose "fast". If memory is physique, quantity is good, may choose "turbo" to try , instability may alter to return "fast".

For the suggestion of memory bar of good memory quality

Than new mainboard, support agp4x , if you show card also support agp4x, so in "agp-4xmode" will this activation, it is "enabled" to choose , this can be just better to develop the ability that shows card , accelerates system to start speed.

2, start dma way

With the technical highest transmission speed of hard disk of udma/33, 66 and 100, it is 33mb/s , 66mb/s and 100mb/s, since theoretically is ide hard disk( here denotes the pattern of pio mode4, its transmission rate is 16.6mb/s) the 6 times of 3 province installation of transmission speed, but inside windows, is short of , dma had been prohibited to use, so, we must open it.

Specific method is: Open the window " control face plate system equipment organizer" , spread out the branch of " disk drive " , click double the icon of udma hard disk , enter " attribute install choose item ", when "dma" item " before ", then according to determine , closing have dialog box, weight starts computer can.

Carry out optimization handling( WinXP), accelerate systematic traversal speed

Carry out optimization

May carry out according to following
1, it is antivirus to
2, the operation scrap arrangement
3, clear away to start item: Beginning
4, accelerate start and barrier machine speed: Start registered table editor ware , find HKEY_CURRENT_USER \ \ Control Panel \ \ Desktop \ \, worth string [ HungAppTimeout ] the data change of number value is [ 200 ], worth string [ WaitToKillAppTimeout ] the data change of number value is [ 1000 ]. Is in HKEY_LOCAL_ACHINE \ \ System \ \ CurrentControlSet \ \ Control additionally , worth string [ HungAppTimeout ] the data change of number value is [ 200 ], worth string [ WaitToKillServiceTimeout ] the data change of number value [ 1000 ].
5, close voluntarily to stop response program: Start registered table editor ware , find HKEY_CURRENT_USER \ \ Control Panel \ \ Desktop, worth string [ AutoEndTasks ] the data of number value alter is [ 1 ], start again can; Barrier machine close voluntarily to stop response program: Find HKEY_USERS \ \.DEFAULT \ \ Control Panel \ \ Desktop( or HKEY_CURRENT_USER \ \ Control Panel \ \ Desktop), when right surface window will [ AutoEndTasks ] the data of number value alter is [ 1 ], write off or start again.
6, clear away the DLL file that not used in memory: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ SOFTWARE \ \ Microsoft \ \ Windows \ \ CurrentVersion \ \ Explorer, a creation DWORD value [ AlwaysUnloadDLL ] set up its value is [ 1 ]. Pour: If set up its value is [ 0 ] represent this function of out of service.
7, accelerate
( 1) family edition: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ SOFTWARE \ \ Policies \ \ Microsoft \ \ Windows, creating a name is [ Psched ] item, when [ Psched ] right surface window new Dword value [ NonBestEffortLimit ] set up its value is [ 0 ].
( 2) business edition: [ beginning ] [ operation ] input [ gpedit.msc ], open local computer strategy, select in left window [ computer disposition ] [ management shuttering ] [ network ] [ QoS data pack manages program ], in right window, click double " restrict the insurable bandwidth that reserves " , select " have started using " and seting up " bandwidth restriction( %) " for 0 applications determine , weight starts can.
8 , fast browse local area network Luo share: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ Software \ \ Microsoft \ \ Windows \ \ Current Version \ \ Explorer \ \ RemoteComputer \ \ NameSpace, when this , have { D6277990-4C6A-11CF-8D87-00AA0060F5BF } item, delete it to fall , start computer again, Windows XP does not inspect the task intended , speed rises obviously.
9 using L2 Cache of CPU, accelerate overall efficiency: Start registered table editor ware , find HKEY_LOCAL_MACHINE \ \ SYSTEM \ \ CurrentControlSet \ \ Control \ \ SessionManager \ \ MemoryManagement, when right window, worth Dword [ SecondLevelDataCache ] the data change of number value is the value of decimal numeral similar to CPU L2 Cache: For instance: L2 Cache of P4 1.6 G A is 512Kb, the data change of number value worths for decimal numeral [ 512 ].
10, it is starting computer
Start registered table editor ware , find HKEY_LOCAL_MACHINE SOFTWARE Microsoft Dfrg BootOptimizeFunction, worth string
11, memory
Windows XP in have some choose item may optimize memory performance, them all under registered table location: HKEY_LOCAL_MACHINE \ \ SYSTEM \ \ CurrentControlSet \ \ Control \ \ SessionManager \ \ Memory Management.
Prohibit to use memory page surface
Under normal condition, XP meeting writes the segment in memory into hard disk , may prevent its this , let data remain to store in , so promote systematic performance. The user who possesses 256 m above memories just uses this installation well. The name of this installation shouts [ Disable Paging Executive ], the value of its since [ 0 ] alter is [ 1 ] may prohibit that memory page surface is managed.
Promotion system stores slowly: [ Large System Cache ] key value since [ 0 ] alter is [ 1 ], Windows XP will store the systematic memory all distributions besides 4 m slowly to file system, this signifies the kernel of XP can store in in operation, raise systematic speed greatly. In the 4 m that leave , it is to do the time that needs under certain condition that magnetic disc stores slowly to store , it is some that XP can still distribute. Generally speaking, this optimization can make systematic performance get considerable promotion, but also possible can make some application program performances reduce. There is the memory more than 256 m, just good activation Large System Cache.
12, queue up prior order for IRQ suspension request: The major parts of computer have installed IRQ suspension number. Through modifying the prior order of IRQ request, may reach optimization purpose. Major optimization is the systematic clock of / CMOS of real time for elephant, it promotes performance through mainboard. Determine to want what package to get higher performance first , find this hardware IRQ suspension number. Open systematic attribute in, choose "hardware" chooses card, click the button " equipment organizer", right key click will check the package of No. IRQ, select "attribute" , click "resource" to choose card. Seeing equipment the IRQ suspension number of use. Under notes, suspension number and operation are registered to show editor ware , spread out HKEY_LOCAL_MACHINE \ \ System \ \ CurrentControlSet \ \ Control \ \ PriorityControl, establishment name is [ IRQ Priority ]( " " is specific IRQ suspension number) DWORD value, and seting up its value is [ 1 ]. The IRQ suspension number as the systematic CMOS clock of real time is 8, will establish value name is [ IRQ8Priority ]. After starting again, will discover the package performance optimized just to rise. Strong suggestion uses this method optimization system CMOS real time clock. May also raise many IRQ suspension priorities, however, it is good that effect sinks , may cause system to be not steady. Will withdraw this optimization installation to eliminate , worth the registered table key established just now to delete fall can.
13, barrier debugs ware Dr. Watson: Open volume table , find HKEY_LOCAL_MACHINE \ \ SOFTWARE \ \ Microsoft \ \ Windows NT \ \ CurrentVersion \ \ AeDebug, worth string [ Auto ] the data of number value alter is [ 0 ], pressing F5 to refresh make installation come into effect , cancel its operation.
14, close the special efficacy in systematic attribute, this mentions fast effective prescription yes. Beginning control face plate system high-grade performance installation in visual effect, installing to adjust for optimum behavior determine can. Such tabletop will and win2000 is very similar, as the blue window of liking XP , may draw on the dozen " on window and button, use visual pattern".
15, manage file with Windows commadner + Winrar, the ZIP support of Win XP is also not as good as for linking chicken rib, because no matter need to not need , start system opens zip support , the system resources that is few originally has again been few to divide, beginning operation, knock into "regsvr32/u zipfldr.dll", then the confirmation of carriage return can, successful sign is to arise to refer to window: Zipfldr, the hit the mark of Dll UnrgisterServer in dll.

2008年4月28日星期一

The net bridge function in WindowsXP

In local area network, have increased a client computer recently, but line ware port has filled fair, for a computer, it is too not worthwhile to increase to gather line ware. , what to be done? The function of " net bridge " of Windows XP needs a prerequisite condition however for the application on style, must have in local area network a have installed the systematic client computer of Windows XP of two net cards. Downstairs, introduce specific realization method:

To distinguish easily to explain object , the following client computer of pack two net cards is called as " customer A", that client computer that increases recently is called as " customer B", specific connection and installation method are as follows:

Supposing local area network

First ensure " customer A" can visit local area network go up resource with Internet, and disposition is well two to net card , in which joins to the net that gathers line ware to block IP address for 192.168.0.1 , joins to " customer B" to net to block IP address for 192.168.0.2. It is " local connection - host computer" to open " network with dial connection " , rename the former local connection that joins local area network , value " another local connection " name is " local connection - customer", then, block the corresponding net " it is local to join - customer" with twinning line( two machines the way united directly ) with" customer B" machine go up net card direct company get up.

Then on the machine of " customer B ", install network attribute , designate a empty IP address and" computer name", as IP address is: 192.168, 0.3, name is computer: Customer B, if other installs " son net covers yard ", " acquiesce in gateway ", " DNS server " and " customer A ", the installation of machine is identical.

Now if" customer A" can visit mutually with" customer B" resource, so explain have succeeded half , take over needs do use Windows XP " net bridge" will" local connection - host computer" join with" local connection - customer".

On the machine of " customer A ", enter the window " network and dial connection" in, choose " local connection - customer" click right key with" local connection - host computer", click the order " net bridge" in right key menu, system begins to carry out bridge to this two connections to receive , if above installation everything correctness, it will be started using successfully that right now, bridge receives. Now, will arise a icon of " network bridge ". Mouse right key click icon choice "attribute", when in" Internet agreement( TCP/IP)" attribute installation IP attribute. For example: 192.168.0.4. It is good, " current customer B " machine may also visit the other computer and Internet of local area network , till then, have realized in the two machine common a Hub ports in local area network to share go on-line.

The quota of Win2003 Server of magnetic disc uncovers is dense

The quota of Win2003 The quota management of magnetic disc of Microsoft Windows is to begin to have got since the system of Windows 2000, it is very important that it manages for the space of magnetic disc with valuable server. This text will introduce the magnetic disc of the system of Windows Server 2003 to all to manage function.

One and Windows Server 2003

In the Windows systematic quota of Server 2003

1. Quota

The quota monitor of magnetic disc the roll of personal user use condition, the therefore every cash in on of user for the space of magnetic disc will not influence same a volume of go up the quota of magnetic disc of other users. For instance, if the quota restriction of roll F is 500MB, , user has preserved the file of 500 MB in roll F, so after this user must first delete or move some existing files from it, may just write in other datas to roll up. However, so long as having enough space, other every users may preserve the file of most 500 MB in this roll.

The quota of magnetic disc is basic with the right had by file , and does not get the restriction of the file location of user file in roll. It does not change that for instance, if user moves file from a file to the other files on identical roll, rolling up space use. But if user duplicates file , in the different file on identical roll, rolling up space use , will be double. Or, if another user has founded the file of 200 KB, you have gotten this file all right, so, the magnetic disc of this user uses , will reduce 200KB, and it will increase 200KB if your magnetic disc uses.

2. Quota

The quota of magnetic disc application roll, and do not get the influence of the file structure rolled up and the layout on physical magnetic disc. Have many files if rolling up , distribute the quota given this roll will entire application have file. For instance, ifProduction \ QAAndProduction \ PublicIs F roll goes up share file, user stocks the file

If single physical magnetic disc contains many rolls, go to quota application every roll, every roll quota is suitable for specific roll only. For instance, if you share two different rolls, difference is F roll and G roll, even if this two rolls on identical physical magnetic disc, also trail respectively for the quota of this two rolls.

Stride across many physical magnetic discs if one rolls up , entire transregional rolls up to use the same quota of this roll. For instance, if the quota restriction of F roll is 500MB, no matter F roll is to stride across 3 magnetic discs still on physical magnetic disc, can not preserve the file that exceeds 500 MB F roll. 3. Quota

In NTFS file system, it is safely identifier that rolling up to use message press user( SID) stock , instead of according to user account name stock. When opening the window " quota" for the first time, the quota of magnetic disc must get user account name from network region controller or local user and group , matches these user account names and the SIDs of current roll user , and using user name to fill "name" the project on row. When region controller or local user gets these names in group, name will show in this field. When looking over quota for the first time, this process begins immediately.

After when get name, may go to its preservation user in" application program data" catalog( ApplicationData Microsoft \ WindowsNT \ DiskQuota) store file slowly, so next time when opening the window " quota", may use these names immediately. However, store file because these are slow possibility continued few angels use have not been updated by Windows, so" quota" window after possibility does not reflect check quota item is for the change that region user account list does.

To get newest user name, please press F5. Then, Windows will refresh the user of every user who comes from network region controller or local user and group to name. According to current network speed and the number of roll user, this process may need some minutes. In this process, if want to look over the name of specific user as soon as possible, may select this project move it the top of list.

4. Quota and conversion

The quota handling of magnetic disc runs all NTFS roll on the computers of Windows2000, Windows XP or 2003 clan operating systems of Windows Server. However, it is already from FAT or it will belong to voluntarily in keeper if FAT32 changes the file on the roll of NTFS, therefore, the quota on these files will by Administrator account management. This is nearly not problem, because keeper possesses infinite roll to use limits of authority. This problem applies to conversion is the existent file before NTFS, and the file after conversion will belong to proper user.

Because the quota of magnetic disc is basic with the right had by file, so as rolling up to do any influence , file has the change of right state, including file system to change , may influence the quota of magnetic disc of this roll. Therefore, when existing roll rolls up conversion before another file system from a file system, you should know that this kind of conversion may arouse the change of all right.

5. The local and

You may start using the quota of magnetic disc on the local NTFS roll of computer and long-range computer. May use the quota of magnetic disc to restrict the quantity of roll space of the different user that registers to local computer , and may restrict the use of long-range user for roll.
May use quota

Many users who register identical
One or more users do not
When personal computer share

Will start using the quota on long-range computer roll, must share these rolls from the root catalog of roll, and you must be the members of the Administrators group of long-range computer. Is other, these rolls must format becomes NTFS, and exist on the computer of operation Windows2000, Windows XP or 2003 clan operating systems of Windows Server.

When system roll goes up realization the quota of magnetic disc, should consider Windows file the space of magnetic disc of use. Basis roll goes up may use space, must install to install the user of Windows probably high quota restriction or do not restrict the space of magnetic disc. If Windows is installed by keeper, , need not be this and operating. Because keeper and the member of Administrators group have the quota restriction that does not get restriction.

2 and Windows Server the role

The NTFS file user quota network space of systems support of magnetic disc of magnetic disc of the system of Windows Server 2003 where manages function and may manage user efficiently is used. The quota of magnetic disc of NTFS roll is trailed as well as control the use of the space of magnetic disc. Keeper may be Windows disposition:

When user has exceeded the designated space restriction of magnetic disc( also allow the space quantity of magnetic disc that user uses ), prevents using the space of magnetic disc further and records incident.
When user has exceeded the designated space

When starting using the quota of magnetic disc, may install two values: The quota restriction and magnetic disc of magnetic disc quota warning rank. For instance, it is 500MB to be able to set up the quota restriction of magnetic disc of user, and it is 450MB to set up the quota warning rank of magnetic disc. Under this kind of condition, user may stock on roll, do not exceed the file of 500 MB. If user the file that on roll stock exceeds 450MB, may record the quota systems configuration of magnetic disc system incident. Only the member of Administrators group then can manage the quota on roll.

May designate user to exceed its quota limit. But want to trail the space of magnetic disc of every user if not think of the visit of refusing user for roll use condition, may start using quota and do not restrict the use of the space of magnetic disc. May also designate no matter user exceeds quota warning rank to exceed quota restriction still whether will record incident.

After starting using the quota of magnetic disc of roll, system takes the automatic use of trailing all user for roll from then. So long as with NTFS file system, roll up format, may roll up in here , network roll as well as may move driver go up start using quota. Additionally, network roll must be shared from the root catalog of roll, but move driver also shares. Windows installs the roll that will escalate voluntarily to use the NTFS edition format in Windows NT 4.0.

Since trailing compressed file according to the size when does not reduce , therefore, can not use file to reduce to prevent user exceed its quota restriction. For instance, if the file of 50 MB is 40MB after reducing , Windows will according to the file big and small calculations of initial 50 MB quota restriction.

The user quota management of magnetic disc is a important task in server management, especially when in large scale intranet Luo, the network space of magnetic disc limits to very much , will cause the plenty of wastes of the network space of magnetic disc on the one hand if not managing the user quota of magnetic disc appropriately , may also bring serious not safe factor on the other hand , may still influence overall network performance seriously, user can not register probably.

The Hunan countryside investigation report of distance education

The Hunan countryside

I have gone to time Hunan in August, have arrived Xiao Xiang that slice of thousand a hundred years comes beautiful prosperous land, personal have experienced scenery is majestic , village is graceful. View Qi-Xiu-Juan-Mei of south has the wonder of cave with stalactites and stalagmites , has the beautiful scenery of terraced field; More simultaneously the morals of folk custom, is of long standing , since since Tang, generation book the domestic person of perfume, do not win frequently to count , millenary academy of classical learning, well-known crest ancient is this , is changeable to modern age, 3 Xiang children, have even more composed the great legend of new Chinese history. Should say , the educational sediment achievement of millenary Hunan of modern times.

I cherish respectful mood , am from provincial capital all the way , am to region , go to the countryside village, side travel scenery , is full Lan beautiful scenery, side has investigated county town two level educational systems, in especially Xiang the countryside educational situation of middle and primary school of region. But this road goes , mood is more heavy , countryside middle and primary school when the outstanding contradiction on infrastructure and the problem of teaching resources, though pass the various effort of central government and place, than have great improvement in the past, but what do not allow overlook is that the horizontal gaps of elementary education between province city and county town are pulling big, this kind of gap step by step to show especially, is on the discrepancy of the strength of teaching resources , and it has the tendency aggravated further.

A, countryside

In general, countryside middle and primary school ages generally than age and the countryside lack strength of middle and primary school of teaching resources of the school strength weakness and majority of the city proper of teaching resources , is puzzled by establishment and educational funds problem , has serious problem recently always alternately.

(1 ), it is serious that

Cause present this kind of situation , is on the one hand because the school treatment of the city proper is high, teacher is influenced by economic factor , asks to adjust to go the city proper; On the other hand, as countryside principals reflect , if have the teacher of characteristic only on teaching, the school of the city proper will try everything to come to" dig " , go. I adjust a national poor county that grinds , county town has only 4 public primary schools and 3 middle schools , has again upraised the 2 or 3 middle schools run by the local people in recent years, between these schools, competitive very intense, burgeoning non-government funded school invites teacher for grabing source of students, hiting advantage mainly with teaching resources and stint no effort to spend heavy gold from other school( county key secondary school and village school) , makes excellent teacher go the concentration of county town further as a result, have aggravated countryside school original already the very fragile contradiction of teaching resources.

(2 ), school lacks the professional

Since the countryside treatment of middle and primary schools is not high , from normal school having gotten special field educational teacher does not be willing to stay in countryside , school these last school hours, often is temporary by the teacher of other subjects to be a guest performer. In certain a countryside, study lack full-time music teacher, it is sung that last music school hour uses recorder by the teacher of other subjects to teach students.

(3 ), teacher

This problem when countrysideIt is managed that in 70-80 year, generation turns by community for the interests of the people, now already 50 years old controls , a lot of schools 45 years old above teachers take the 70% of total more. These teachers support the educational undertaking of countryside, their winner of sense of duty works hard for working , for the educational undertaking of countryside make have happened cannot wear away contribution, but now, age is big, the level of educational background is low, knowledge structure ages , accept new teaching theory to slow comparatively, on teaching, there are also few generate new ideases, is nearly impossible to meet the needs of new course reform. And just graduated normal school is raw again draw up fully because of teacher Yuan, can not enter corps of teachers , would not divide countryside school more to teach. Few even if have gone , do not often also take root , is usually dry compare be experienced for some years, on teaching , try to leave countryside school.

2, reform train of thought

It is numerous, educational by the population of our country to put in the insufficient problem of the compulsory education that resource allocation not causes and will solve large countryside region that the difficult condition of countryside now of middle and primary school goes back to root after all, to be not a merit of dynasty a night decidedly, must want to create train of thought fully in line with the policy of vital and lasting project for the attitude with responsible descendants using existing resource and new technical means , keep pace with the times , is exploring and summarizing foundation constantly , find out a solution that accords with Chinese actual conditions of our country the effective channel of the countryside problem of the compulsory education.

Along with the progress of social technical level, the time when distance education that advantage shows step by step, one accesses to solution the spacious road of the countryside educational problem of middle and primary school also is clear therewith.November 2002, the project " Beijing - Changsha - Shao the mountain vehicle of distance education of straight line" that Beijing State Education Commission and Hunan province education department plan together opens , make Hunan have realized middle and primary school to step province real time move distance education mutual zero breakthrough, to educate the reform exploration of teaching recently under form, have made brand-new pattern.

銆€銆€In 2004, country develops and reforms the 3 member alliances of committee, Ministry of Finance and Ministry of Education , has started the countryside modern demonstration project of middle and primary school of distance education of experimental unit and the countryside modern work of middle and primary school of distance education of experimental unit one after another. In 2005, the countryside modern project of middle and primary school of distance education enters to implement stage completely.

The countryside modern project

銆€銆€Pattern one is

Allocate34 inches of colored television, DVD play machine and whole set teaching compact disk. Pass through play teaching compact disk for student give lessons and guidance. It is that countryside school layout adjustment needs the teaching point of reservation certainly mainly to allocate object, it is in average each and some to invest in budget 3000 Yuan.

銆€銆€Pattern 2 is

Allocate satelliteThe teaching that DVD play machine and 1-6 year level need compact disk. Through the Chinese educational satellite transmission network of wide band, take over high quality resources for education fast in large quantities , and at the same time have the function of the teaching play point of compact disk. Equipment is town central primary school for elephant and has little village. Each some investment budget 16 thousand Yuan.

銆€銆€Pattern 3 is

Allocate satellite to take over systematic, network computer classroom, multi-media classroom and the teaching play equipment of compact disk. Its characteristic is to be able to still offer the learning environment under network condition for student besides having the 2 all functions of pattern. Equipment is countryside junior high for elephant. It is in average each to count budget150 thousand

The countryside strength of teaching resources is insufficient, basic problem still lies in system and educational funds to put in machine made aspect , but at present situation take off, system transform is not the most sensible method, and have the aid of distance education , happen to be able to alleviate the contradiction of the high quality resources for education of the city proper and the village gap of teaching resources , is the current effective channel that solves the countryside problem of middle and primary school of teaching resources.

3, the project

ThisIn June, Ministry of Education has announced the teaching compact disk " the 2006 countryside modern projects of middle and primary school of distance education" to buy pre-qualification qualified supplier and catalogue item , has guaranteed the pattern a application effect of pattern 2 efficiently.

TheIn August, the department of Ministry of Education of elementary education has sent " about make the free notice that department region countryside middle and primary school offers the work of high quality resources for education east ", requirement the places such as Beijing, Tianjin and Shanghai State Education Commission( education department), make a success of free east department countryside middle and primary school offers the modern project work of distance education of resources for education, having put forward the countryside modern project service system of middle and primary school of distance education of resources for education build working scheme, principle stipulates scheme:

1With the communication way satellite data broadcast and internet, combination is searched for , the technologies such as grid and equal calculation, found by country , province and land the distribution type service system of resources for education that city and county different levels resource centers cooperate with mutually.

2According to needs, the type redundancy of

3National resource sends different

4Every place offers whole country the resource

5 Protection of intellectual property passes through use person really well-known system registered realization, user message from different levels maintenances, national centralized control, guarantee user attest is consistent and shortcut. Teacher registered message adopts the message in existing system as far as possible.

Compared with pattern a, pattern 2, the advantage of pattern 3 lies in the application of network , may get huge, newest resources for education with the connection of resource storehouse through being , at the same time, have the aid of related educational software, can realize two lands online real time move mutual to exchange , pass to so lead into" fresh person" factor, having overcome the simple teaching lack of compact disk in pattern a, pattern 2 mutual move abuse.

Beijing has now established the Beijing, as source application is focal point, with realization, common construction resources for education shares resources for education and the resource management with extensive alternating resources for education of goal and alternating platform system generally. If can be on this foundation , realization Beijing excellent teacher resource and the countryside middle and primary schools of central and western regions teacher and student move mutual to exchange , can have the application effect of the platform of distance education( pattern 3) greatly vigorously surely, this for solution the tense present countryside teaching resources of middle and primary school, protection is educational to put in , ensure that working tangible results has major meaning.

Beijing is country capital, the educational undertaking of Beijing also always leaves from nation-wide overall interest, have undertaken to support midwest , especially the important task of countryside region, and we are a member on the battle line of apply IT to education, will even more remember the Party Central Committee about " with informationalize drives educational development " strategy and policy, make contribution with our each some sturdy work for the education of a hundred years of country.

2008年4月27日星期日

In hint, store 10 insufficient big reasons

In hint, store
A, clipboard memory

Actually, clipboard is a temporary area in memory, after you have used in program" duplication" or cut order, Windows will stock the messages such as duplication or the content cut and its form temporarily, is on clipboard , to let " paste " use. If the deposit in current clipboard is a drawing, clipboard has occupied a lot of memories. Now, please press to state step , clear away the content in clipboard, release the memory resource of its occupation:

1. Click "beginning", " directional program " or" all program", " directional attachment ", " directional systematic tool " then click " clipboard check program" , open the window " clipboard check program". 2. On the menu of " editor ", click " delete " to order. 3. Close the window " clipboard check program".

With the multiple clipboard that the program of Microsoft Office offers appearance distinguishing points, the above-mentioned clipboard said is called as systematic clipboard frequently by us. If you are using the program of Micros OftOffice, also, have used its multiple clipboard function, so, you should settle the empty project on " Office clipboard ", method is: When" Office clipboard" task window shelf( OfficeXP) or toolbar( Office2000) go up, click " settle completely to leave empty " or " settle empty 'clipboard' ". When settling " leave empty Office clipboard ", it is empty that systematic clipboard will be also at the same time settled

2, the program

If the document that at the same time opens the too much program of operation is too much, have no other enough memory operation programs. Now, for many document interface( MDl) programs, such as Word and Excel etc., ask all document that closes current document , and quit the program not used now , then perhaps, you can carry out continuously the task that had been suspended because of " memory deficiency ".

3, start computer

If quiting program only, do not start computer again, program possibility can not give system memory resource return. Please start computer again in order to release system resources , then run program again or execution by the task of suspension.


4, the program

If the program that runs voluntarily in starting Windows

( one) the program with

1. Click "beginning"

2. In opening frame, input "Msconfig" , click "definite"

3. Click "routine" to choose card in, choose " selectivity

4. Click "definite" button, when system

After starting computer again, if memory insufficient

( 2) disposition computer

1. Recover the change made in Msconfig, method is: When" the utility program of systems configuration" window, click "routine" to choose card , select " start normally " , click "definite" button , then start computer again.

2. Delete to start all

Click "beginning", " directional installation

Click " begin menu " to choose card

Click " start " the plus sign near file, it is taking showing installation as the program list of automatic operation. Have no if starting file " the + of plus sign ", show that no installation is the program of automatic operation, please click to close button with this termination process.

Click " start " every shortcut in file, then, click the button " delete ". This operation will delete shortcut from "beginning" in menu, but do not delete corresponding program from hard disk. For " start " every shortcut in file, repeat this step.

Click " close

Click " determine

3. Prohibit to use from

Open as above" the utility

Click "Win.ini" to choose card , click double " [ windows

Click " determine " button, when system

5, let Windows manage

Let Windows manage fictitious memory if having not installed or prohibit to use fictitious memory , so, computer can not be worked probably normally , is also possible to receive the news of " memory deficiency " , or arises identical wrong news when runing certain program.

1. Click "beginning" , click "installation"

2. In the dialog box of " systematic attribute

3. Choose in " let Windows manage fictitious memory installation -( recommendation) " choose item, to acquiesce in, worth the space quantity installation of hard disk that may be as fictitious memory used in computer. It can be reduced and magnified according to the use condition development of actual memory that right now, in fictitious, storing divide " page win386.swp ", minimum capacity is 0, biggest capacity for hard disk may use space completely.

4. Click "definite"

6, increase

Use the space of hard disk since Windows divides the form of page file with fictitious memory in order to imitate RAM(), so, though having installed to let Windows manage fictitious memory, when fictitious memory divides the driver of page file place( acquiesce in for the zone of hard disk of Windows systematic place), can still arise the mistake of " memory deficiency " when having no enough space. Right now, ask conducted following a or many operations, increasing Windows fictitious memory divide page file place driver may use space:

1. Clear empty recycle bin and method are:

2. From magnetic disc, delete temporary file, method is: Open " Windows explorer" or" my computer" window, right key clicks to release the magnetic disc of its space, then, click "attribute" , click the button " magnetic disc puts in order " on "routine" chooses card in, choose the check box before file that will be deleted and not need ( as Fig.3), may read the list explanation of every file type in following area , click "definite" button.

3. From magnetic disc,

4. Delete never

7, program

If only use certain program, system hint memory deficiency, and other programs may run normally, so, possible reason is that this program file had been destroied , so, cause memory problem. However, Windows has not pointed out definitely to show that this program has damaged , so asks try to delete and installs this program again, then, run this program again. If system does not refer to memory deficiency, so, explain that program file had been damaged really.

8 in use, store

There are many memory optimization softwares, for example RAM Idle and Memo Kit compare remarkably two. These softwares may install voluntarily clear empty clipboard , release has been closed program the memory not released , is for Win386 , swp file goes on reorganize etc., so, avoid the trouble of your handwork operation , reach the purpose stored voluntarily in release, not Fang a examination!

9, it is

System influence computer virus is also the chief offender that causes memory to be below, when system arises the mistake of " memory deficiency ", it is antivirus to ask the software of gas defense with newest use to check , or after clearing away computer virus, have solved the problem of " memory deficiency ".

Cause the evil manipulator of web page of high browser resource occupation

Along with the development of computer and network application, computer information security is dangerous as being faced with and the loss that has caused is also increasing into time, especially various hackers grow , some personal users also often encounter the attack of different means, this has to arouse our attention.

For personal user, except virus and hobbyhorse, the invisible code in web page also begins to threaten our safety seriously, but the most persons lack self to protect consciousness , are not enough for the harm knowledge of invisible code , have even stolen important information under the condition that not known the facts by oneself by others. Because of invisible code have comparison big conceal sex, so far, have no virus fire wall yet can prevent the attack of invisible code well, majority can not even discover at all. So we more should the invisible killer in the high alert code of web page. In generally speaking the code of web page " invisible killer" divide into approximately following some kinds of:

Invisible killer

Through the system resources that consumes this machine

The typical mischief of code of " invisible killer 1 " is to produce a dead cycle through JavaScript. This kind of code may be to appear in having the website of malice, may also give you with the form of mail attachment. Now, the most mail customers hold program, may use browser voluntarily to open the file of the type of HTM / HTML. Such only you a dozen of open attachment, on screen, will arise the browser window that countless opens recently. Finally, let you have to start computer again.

Avoid bad method for this kind of problem, it can only be the attachment that does not open casually the mail that stranger sends , is .vbs, especially development , .htm and .doc , , the attachment of exe.

Invisible killer

The practice of this kind of code typical case passes in web page

The code of " invisible killer 2 " is to show way to conceal comparatively than the characteristic of " invisible killer 1 ", general person does not discover easily invisible code is reading to take the file on own hard disk. " invisible killer 2" can still realize it using browser self loophole to kill to recruit, such as IE5, the IFrame loophole of 0. Some lines of very simple codes may read to take the file on your local hard disk that any IE may open.

Avoid bad method may pass to close JavaScript

Invisible killer

Attacking person to pass attack first into the responsible DNS server of the goal machine analysis of domain name, then go to DNS - IP address reset a he has taken the host computer of super user limits of authority.

This kind of attack now seldom appears in domestic , but endangers if succeeding but is very big. It is heavy to lose. Method is its attack: When he has taken that host computer of super user limits of authority on a fake environment completely similar to goal machine, the user who comes to inveigle you to hand over you is well-known and password. For example, our mail even the bank account number on net and password. Because what you face is a environment similar to yesterday, when you skilled knock into user name and password time. It is not genuine host computer to have not thought of at all.

When avoiding bad method go on-line, best barrier loses JavaScript of browser , makes attacking person can not hide the sign of attack , only just opens it when visiting familiar website, though, this can reduce the function of browser, but I think that this is still been worth for. It is to do not link other websites from the website that does not know by oneself to still have , especially link those needs to input the website of the password and name of personal account.

Invisible killer

This kind of present problem

We may now see the safe installation of own IE, for " download ActiveX that has signed control ", now choose item is " hint". But your possibility does not be known , IE still has privilege, download and carry out program under the condition of need not point out. This is a serious safe problem, we may be controled completely under the condition that not known the facts by others.

Compatibility Flags0x00000400:

Invisible killer

The harm of this kind of code is

This is not sensational, actually, IE may make hard disk be not what new loophole by format through conducted ActiveX , contains the web page of this kind of code if glancing over , your machine hard disk will quilt fast format, also because of format window is minimum, your possible foundation has not been noticed , until discovering , have repented too late.

Avoid bad method deltree and format.com of this machine, it is a method that the dangerous orders such as exe rename. Because we, in Windows, will use really the condition that these DOSs order and are not many, many Hong virus or dangerous code is to directly use these DOSs to order , if famous country produces Hong virus " July killer ", it is to have joined deltree c in Autoexec, in bat: \/y.

Can not modify the safe rank that IE acquiesces in

jhfak DHKQWE BBJBFF hfwek f fhejrfhqe,nf fwehfk ef,mnaskfb f bfjkqegfq


fwaefhkjqe brkqheknf ,a sdf,ashf agbd,zxf vffadwhireqwtnbnfkb rfnbqkwegfkb f

fnjkehrfklewntlmfgjfgh,.trym trwejt jklrjtlwrntlwh gmfg,dn,. sfnsldfhwot,.m.kgljolrtg"rekogjlkw.

The( KFC) fried chicken of Kentucky Fried Chicken leg wing practice

On Blog of a pair of new person, have seen , is the information

One ), pickle
1) will after raw material
2) partial oils fry raw material
3 ) puting into in advance modulation good pickle in Zi material,( chicken piece: Pickle material:=100 g of cooking wine: 10 g: 20 g), pickle normally Zi 2-3 hour controls , the material preserved in salt is the soundly hot powder of fried chicken of taste good beautiful brand( other brands also may).
2 ), wrap powder process: (
1) go up need to ensure before wraping
2 ) wrap powder the powder of adjusting the burial of raw material well, 10 finger holds the two ends of raw material to go same one side to make efforts to roll to rub to press five times more( powder wants many).
3 ), put to soak 2 seconds in Qing Shui around, in make wing goes up powder moist can, the dry powder of parcel raw material changes paste form( prohibit to fall out to move when soaking , prevent water paste rushes , fall if having been rushed may wrap one powder again)
4) carry Li dry water share in, put into dry powder again repetition above-mentioned wrap powder to press the method of rubing 5-10 above, epidermis is completely even to hang scale , can stop pressing to rub.
4 ) wraping the raw material of powder should immediately oil explodes , otherwise can influence the generation of scale. Oil fries temperature to control , fry 5-6 minute within 165 degrees, explode to color and luster is weak and golden yellow to drag. Prick the most thick place with toothpick to see whether have that blood water is emited.

2008年4月26日星期六

The barrier of local area network shares go on-line, how to let designated IP use to share connection only with day net installation

Through day

Need to

1: Data pack direction:
The IP address of
The data agreement
When satisfying
2: Data pack direction:
The IP address of opposite side: Designate
The data agreement
When satisfying

Pay attention: The

To choose satisfactory mainboard

To choose

The foundation as the overall structure of computer, mainboard choose to be is important, many friends in since a lot of books and periodicalses have seen mainboard the article chosen , but the rapid speed of weed out the old to bring forth the new and the renovation of product, make us can not apply mechanically regular formula, moreover various mainboard kinds are numerous, how do you then can choose the mainboard with higher a cost performance easily?
Following summary happens following
The battery
Battery is set up to maintain the operation of CMOS data and clock. " fall news " denote battery to sink news , can not maintain CMOS data, even barrier machine is rear, clock does not be also gone to. Choose , observation battery whether rusty, leakage liquid, if get rusty , may change battery; If leaking liquid, serious, may cause piece mainboard to discard because of corrosion.
2, chip produces
The speed of mainboard not only depends on the speed of CPU , at the same time also depends on the performance of chipset on mainboard. If the production of each chip date differs is greater, will be careful. Generally speaking, time differs the unsuitable overall performance that exceeds 3 months and will influence mainboard otherwise.
3, expand
Generally speaking, ISA development groove is easy to observe more than PCI development groove. Method is to observe the location shape of the spring flat of groove hole first carefully after, insert ISA card in groove again pull out , the spring flat location shape that observes current groove hole whether and is originally identical, if have greater deviation, explain that the spring flat elasticity of this slot is not good, quality is lacked comparatively.
4, weight
First, see mainboard thickness, two mainboards are compared , thick person is advisable. Observe the number of plies of mainboard circuit board again and wire layout system whether is reasonable. Take mainboard , separate mainboard as light source sees , if be able to observe the component of wire layout of another surface, explain that this mainboard is double-deck board. Otherwise mainboard is 4 layers of or multilayer board, when choosing , should choose 4 layers of or multilayer board. Is other, whether wire layout is reasonably smooth, will also influence the electrical performance of piece mainboard.
5 , shake
Careful observation each group jumps line whether is empty to weld. Start after, light wave to jump line, see personal computer whether make mistakes , if have to make mistakes , message explains to jump , have loose line and unstable performance, this mainboard is not being chosen.
6, software
Choosing SPEED series to measure fast software and SST series measure fast software. About the use of this two series softwares, the friend that is interested may look up relevant information independently.
Certainly, when choosing mainboard, the mainboard standard of every user for own requirement is not identical, specific each may need according to own economic condition and work choose. When choosing , excluding above quality still notice brand and the manual of mainboard besides the coherent law distinguished, if your hardware knowledge is not very sturdy, suggesting to do not want purchase those no manual or handwriting does not settle to have no the mainboard of remarkable brand. Is other, is surefire, best talk with manufacturer when purchasing , allow to send back goods.

Few recruit raising to net speed

It is restricted that a Windows XP of method joins speed
Current broadband networks Luo is going step by step into family, get extensive application, but the web page of some user of broadband networks glances over speed, upload and download speed is still unsatisfied. Actually in Windows 2000 in or XP, show through modifying registration, we may let the speed of broadband networks have considerably raising, enjoy the delight of very fast go on-line really.

Run "regedit" in order to open " registered table organizer"; Then, according to following route, find HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters. Right attack "Parameters" son key right side relative should blank place, it is "DefaultTTL" to select to" create the DWORD value " "" , name it , then, right attack mouse choice to" modify ", in the window of springing , it is "80" to modify its value( 16 enters system) or 128( decimal system).

Create again in proper order " following DWORD

" it is "EnablePMTUBHDetect""

" it is "EnablePMTUDiscovery""

" it is "GlobalMaxTcpWindowSize"" "=7FFF

" it is "TcpMaxDupAcks""

" it is "SackOpts""

" it is "Tcp1323Opts""

" it is "TcpWindowSize"" "=7FFF " or "32767"( 93440 or 186880

Then, preserve our modification , start

Method

Pay attention: This method

Before doing these modifications, please make the spare of registered table first in order to, when being improper for your condition or when modifying mistake, recover the optimization method that at the same time introduces here since the difference of the network of every place does not guarantee to play role surely with you.

The optimization

Windows XP dials from tape PPPoE , has optimized the connection of network more completely, so, the place that we may optimize decreases greatly, according to the Microsoft official information grasped now, we may still carry out suitable own optimization for some following places to adjust.

of - > of - > determines ) in some following projects to join some following values:' >Open registered table editor ware( beginning menu operation

1, HKEY_LOCAL_MACHINE System Ccs Services Ndiswan Parameters Protocols \ 0 is 2 below this eye next increase the

The name of * * * *:

The type of * * * *: REG_DWORD

The key value

The name of * * * *: PPPProtocolType

The type of * * * *: REG_DWORD

The key value

Now, may increase

The name of * * * *:

The type of * * * *: REG_DWORD

The key value

The PPPoE user of ADSL installs MaxMTU normally, is

2. According to the Microsoft explanation

When some following

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters

SackOpts=00000001( two byte DWORD

Tcp1323Opts=00000001( two byte DWORD

DefaultTTL=00000040( two byte DWORD

EnablePMTUBHDetect=00000000( two byte DWORD

EnablePMTUDiscovery=00000001( two byte DWORD

GlobalMaxTcpWindowSize=0003ebc0( two byte DWORD

Method

, with ADSL Modem, receiving the problem cared about into the user of internet most is network speed. All mention speed( as modification registered table) with various means for ADSL Modem, effect is surely some , but is often not especially ideal. The author when this introduces more a kind of comparison to all effective mention fast method( this method applies to Windows XP/2003).

As the equipment of ADSL Modem, is linked with net card , is direct the way that is linked with USB interface is unstable, now already few to have adopted. First, store in the machine wanted to guarantee you above 256 MB, because using this method needs to store in, open up a buffering area, is used to raise the visit of user speed, if your memory has little error, can influence systematic operation on the contrary.

The signature files of August 9,2006

- - I am not thinking

[ originate from me to join theIt is second to fall]

- - will be good at to create

[ the rupture that originates from same spouse

2008年4月25日星期五

Present situation and the history of IP address

1 , the historical

( 1) early stage IP address: Since the experiment that American Ministry of National Defense authorizes ARPANET to carry out internet in 1969 , have announced the birth of internet , IP address also starts using therewith. In the beginning, since the quantity of host computer is few, IP address is used to distinguish different host computer mainly, people are free for the use of IP address, but as host computer grow , many abuses of this kind of phenomenon also show , had been put out step by step along with a lot of classification agreements, this kind of phenomenon is also changing gradually, this stage the IP address of use may be called as early IP address.

( 2) IPv4 address: In 1982, DCA and ARPA net have worked out network transmission control agreement( TCP) and Internet protocol( IP), this agreement group had been abbreviated normally for the agreement of TCP / IP, TCP / IP has founded future network communication pattern. Beginning from the Internet and agreement of TCP / IP, use IPv4 address and 32 bits, usually use 4 some minutes decimal numeral expression. It is formed mainly by two parts: Part is used in identification to belong to the network address of network; Another minute is used in marking to give the address of host computer of the certain specific host computer on network. To offer necessary flexibility to the network of different scale, the designer of IP divides IP address space , aim at for the partition of some different address classifications and address classifications in the network of different big and small scales.

( 3) IPv6 address: As even net mutual to develop speed accelerate constantly, no matter CIDR technical still NAT conversion technology, can not prevent IPv4 address resource exhaust , it is extremely urgent for the requirement of the enough big IP address space in the IP agreement of next generation. To satisfy the address demand of internet increasing expansion, after IETF( the internet project special work group of Internet Engineering Task Force) pass long research beginning from July 1994, have put forward this a edition of IPv6 of IP agreement, now people have begun for IPv6 address carry out and part application. IPv6 address 128( 16 bytes) write 8 16 have no symbol integer, every integer enters system with 4 16s position expression, use colon between these numbers(: ) part , simplify , so long as guaranteeing that number value does not change , may leave out preceding 0 , is other, still stipulate may use symbol: : Express a series of 0.

2 , the present

( 1) IP the distribution

What adopt because of the distribution of IPv4 address is the principle of " arrive first first get, according to need to distribute ", internet in global every country and every country the development of every area again is not balanced very much, this certainly will cause plenty of IP address resources to concentrate the condition that spreads in some developed regions of every country and some developed countries. The IPv4 address that whole world may offer has probably more than 40 100 million, between estimate in future 5 years will be distributed completely; And the condition of our country is more stern, the netizen of our country has broken through 100 million , and ends for the end of last year, the address of IPv4 that our country applies for in all only 60 million controls.

The distribution condition of IPv6 address also presents serious distribution not balanced sign. From 1999, RIR( the internet regional authoritative organization of resource allocation) begins to distribute IPv6 address , ends for June 2004, in the 606 pieces of address that whole world already distributes , the address total of American, Japanese, German, Dutch, British 5 national distributions takes the 48% of global total, China has only 11 pieces , takes 1.8% only. And according to the data of the newest telecommunications research institute of Ministry of Information Industry, show that end for November 2004 in, the 725 pieces of address of IPv6 that whole world has distributed , 99 pieces of America and 73 pieces of Japanese, German 72 pieces, and China has only 14 pieces.

( 2) IP the application

Because of IP address distribution is not balanced very much, making genuine, in application, have arisen the present situation of partial areas of partial countries and some countries that is not enough to use , this has also arisen the IP phenomenon of address resource transregional region trade.

Though everybody understands that the resource of IPv4 address is already deficient, IP agreement has been historical and inevitable from IPv4 transition to IPv6, Ipv6 address has been also distributed beginning from 1999, now, experiment net 6 Bone of IPv6 has spread all over whole world, but present present situation, what global countries nearly use completely is still IPv4 address, existing nearly every network and its equipment that joins support IPv4. Therefore to be completed in short period from IPv4 to the conversion of IPv6, it is not practical occasion. IPv6 must the remained problem of supporting and handling IPv4 system , may foresee , IPv4 then can be completed to the time of IPv6 that transitional needs pretty grow.

IP address inquiry

IP address has formed the foundation of entire Internet, each computer on entire Internet relies on only IP address to mark , it is distinguished and contacted mutually mutually that each node relies on only IP address. IP address inquiry is based on IP seek address regular and distribution standard for the IP address of the only certain a computer on Internet carry out track and the inquiry of location, based on this inquiry result, may carry out various later operations, including implementing sanction for bad person. Downstairs, I explain the related knowledge of IP address inquiry briefly.

( Yi) IP seek

1 , network

A, network address

B and network identification can not with

C, the first byte of network identification

D, the first byte of network identification

2 , host

A and the identification

B, every position of the identification of host computer

C, every position of the identification of host computer

( 2) the method

1, how to check

There are many methods of the IP address that checks self, according to the method of realization, come to divide , may divide into 3 big kinds approximately: Realize with Windows from the software of tape( if use the softwares such as Ipconfig.exe, Winipcfg.exe, Route.exe, Netstat.exe and NetMeeting) , check own IP ( some network noteses such as the pursuit software that uses country to produce, the software of IP Hunter of only lonely swordsman development and Icounter notes consuming software , use visit many window browser etc. such as - MyIE as net occasion) using tool software , enter IP that can show the website of IP address to check self.

Realize and use tool software with Windows from the software of tape to check own IP , this two kinds of method has certain difficulty for operating the most ordinary online friends, and it is the inquiry method that masses of online friend can grasp not strenuously to enter IP that can show the website of IP address to check self, you need to remember some use network address frequently trip. General network address has: The Chinese station www.zhuibu.com, world network www.linkwan.com and whole storehouse net 123 of network resource of inside story check www, 123 cha and com, you not Fang try their inquiry has is shortcut!

2, how to check

How to check out some kinds of

( 1) mail inquiry law: When inquiring the IP address of the computer of opposite side with this kind of method, first, needing opposite side to give you first send one E-mail, then, you may pass through the method of looking over this mail attribute , come to get mail , send person the IP address of place computer.

( 2) journal inquiry law: This kind of method is to chat through fire wall for QQ to record the journal record that carries out the monitoring of real time and then opens fire wall, find the IP address of opposite side.

( 3) tool inquiry law: This kind of method is to search the IP address of the computer of opposite side fast through professional IP address inquiry tool. For instance, WhereIsIP and network assassin II etc. search tool, you may relaxed basis the Web website address of the good friend of opposite side, search gets the IP address of the good friend of opposite side, can even still search the good friend of opposite side the physical location of place, but you need to know the Web website address of opposite side.

( 4) order inquiry law: This kind of method is to order "netstat" through the network of Windows systematic built-in, come to check out the IP address of opposite side , however this method needs you first come up with an idea invites the good friend of opposite side QQ in " 2 world circles" say few sentence words just may.

( 5) ping the law of inspecting: This kind of method order inspection using "ping" current computer whether can even know with the website of opposite side, in the process of inspection, this address can get the IP address of the website of opposite side voluntarily, but you need to know the Web website address of opposite side.

( 6) enter can inquire the website inquiry

2 , so as show IP address and as have with the common IP address inquiry website of

Life is living

These times are on the not calm, former department meeting of two weeks really , are carried because of holding differing opinions and manager for the management measure of manager , afterwards, would not always manage him , have also had no interest for working. Few days before mother calls twice, say that buy house and buy the matter of camera, and my opinion difference, as soon as saying that house is bought from the far point of city center, so, it is a little bit big to be able to buy , go to position one time , and say that it is cheap to buy camera to buy , say that have watched television, patriot is good, I also do not know why one hears air, when I seem that this two opinions is so absurd and ridiculous, so that can not tolerate them have floated in my ear side, as a result, may think , again many two Taoisms are frequently little and noisy.

I have habit, meeting is not timing , does not fall into deep meditation voluntarily, thought life is also introspected by oneself. Since entering university, leave hometown to , and the telephone of mother " for battle " have not stoped , up to this graduated two years, have just been few a lot of , make a noise however to be to make a noise, though face to face I hold a diction that compose , lay aside telephone, I can again remember the words of mother constantly, think whether my words have to hurt her , think that she knows my thought. Though, I am the person with rich feelings, but also having is keen on face-saving illness, so that " good table likes , difficult dew worry ", usually for others does wrong matter, has hurt me, I may be tolerant , do not go to look into , and have hurt the words of others if I do wrong matter, I meeting often depressed knot heart, would not again take the initiative mistakes, perhaps, I can compensate through other way, may would not express always, would not expose. Have time I can think , who is me after all, I am a what person actually in, others eye I will be what appearance, on this world, really having person understanding others all hearts? Mother has lived with me for more than 20 years , but does not know the crux of my feelings - - the chains of that shackles always; I, in my world, have had the state of mind that also seems to can't more and more feel me for more than 20 years, I go stubbornly forward , hold together life with the exert oneself of a kind of fashion, occasionally, I can be still in the popular little test on net , find comment - - eagerness ox Lang the love like woman weaver, and is willing to pay out the effort of surpassing ordinary person - - that is the only spiritual comfort in now realistic world that can get for this kind of love of seems unimaginable other.

Do OG for the first time

Make the part of Diagnostic Test - - Quantitative yesterday , discover a problem, many mathematicses describe to see , do not understand for example the mean, the median and the standard deviation, see do not understand , naturally, have no way of doing problem, some place is guessed groundlessly: (, still some problem is very simple, for example, ' s revenue in 5of its revenue in December and its revenue in January its revenue in November , then the store' s revenue in December was how many times of if a certain toy Of its revenues in November and January? In this problem, I am to

The word that had been not seen sees

2008年4月24日星期四

The more does person grow up , have crispy heart the more?

Accompany in Beijing the table aunt grandmother that has lived for 7 years has died , so suddenly, it is at the time that I can't leave 3 months. Remembering me for the last time meet that evening, I say for her, " not use some years I will return , wait that I will lead time , bring little younger brother to take care of your . . . . .. ", however, it is few that she gives my time, old, in day, reserves the time that gives her and is so few.

I have turned the file of computer , cannot also find her a photograph, all relevant things have staied in Beijing , may when at heart, I remember the both hands of her gray hair and her withered trunk forever, still have to meet for the last time she sends me the station of rail cars in port road opposite in dark that thin figure.

Wang Zhi Dong: It is successfully what to need to defeat competitor?

Explain: This text is the Lava - lava subject of this 5 G after

Do not know some time , also no matter domestic or domestic. So long as having a new product to come out , person will always care about " your competitor is who? ". If have no competitor or competitor, it is very weak , will ask ," originally, nobody does this one , do not ripen surely La"; Otherwise, all will cry out in alarm " competitor is very powerful, you how to defeat him! ", then " I see your competitor may at least still live 5 10 years, this is lasting war He! "

Originally, your competitor winner is also not, weak is also not, have is also not, have no is also not. What is more important is that seem if you have not defeated competitor, or put it into death , or wait for until it falls , will not have otherwise to turn over day.

But genuine problem is

Not from remember the 4 coherent advantages of 98 years to set up Sina Web , the competitor that we meet in domestic is Sohu and Yeah obviously, a they are holding high( occupy the market of white collar with search) , another is lowing end( personal web page lures rough root netizen) , has seemingly taken domestic network world completely, will Sina Web succeed , must defeat Sohu or Yeah? Or they pour necessary wait? In fact, at least 2001 ago, Sina Web and Sohu are also good , are good with Yeah , and have not arisen the conflict of front regardless of Sohu or Yeah, have no had been overthrown together for the Sina Web of gateway. It is so, Sina Web hit the mark. Afterwards, Yeah has surmounted Sina Web, also being not have overthrown Sina Web to deliver.

Also, Google has now become , tack in the eye of Microsoft, have become oldest competitor. However, hit the mark of Google also has no , have not overthrown Microsoft more because of having defeated Microsoft.

There are

Originally, hit

World has no two slices

Make own thing , do as.

2008年4月23日星期三

When restoration network joins , arises DNS to store slowly the problem that not cleared away

1 meets this kind of condition, the most simple means that we can adopt are to refresh DNS, also in delete DNS analysis ware to postpone store entry. Click" begins " -" to run ", is "-" to input cmd and click" determines ", when order hint is consistent , in window, inputs: Ipconfig/flushdns
2 if do not be all right above, when in system service

The attack according to the network scissors hand arp deceptions such as the network officer network secret service personnel of enforce the law in, may restore operation with net card clear away arp to store slowly in, may order with cmd arp - d order
A good method is to write
VBS Set Oshell=CreateObject( "wscript.shell")
VBS Oshell, " run cmd/c arp-d ", vbHide
VBS Set Oshell=Nothing
VBS End Sub
Delay1000
This one is each separate 1 seconds

Through the message that IPConfig offers , may determine existence in the problem on some dispositions in the attribute of TCP / IP. For instance use "IPConfig/all" may get the detailed disposition message of host computer , in which, include IP address and son net to cover yard and acquiesce in the messages such as gateway and DNS server.

Time , as if the water in sponge, you squeeze it the more to run off , have to be the more rapid

Today, have calculated a next time, if 25 Sep kills G, still have whole 10 weeks and 70 day and nights, only going , it still has the English lesson of Monday and two Wednesday evenings every week, in working hour of 5 days , calculates for two days every day in weekend according to 10 hours , probably has only 360 hours in all, task is arduous. However, need not be also afraid of , insist come down , it has been a very amazing matter , go to time moreover spoken language and vocabulary two progresses, Wa, want to not apply for disaster. ChaseDream, workshop, etc. I O.

P.S. Today having summarized one next relevant

If S1 then answers might be A or D; Go on to check S2;

If S2 then answers might be B or D; Go on to check S1;

If S1 then answers might be B or C or E; Go on to check S2;

If S2 then answers might be A or C or E; Go on to check S1.

2008年4月22日星期二

ADSL wide band uses some common problems in process

ADSL( the asymmetrical digital loop of Asymmetrical Digital Subscriber Loop of subscribers feeder) are one in xDSL clan member Yuan, is praised as by western etc. developed country" the express on modern information highway". It receives deeply because of its down speed high wide, performance high-class characteristic of frequency band masses of user like , become the another kind after MODEM and ISDN brand-new more shortcut, higher effect receive the way of entering , also being most for present domestic to use receive the way of entering.

When broadband networks in Luo the process of using , can often meet some difficult problems , cause to can not get on the Internet normally , influence work, study as well as amusement. Following in ADSL wide band the process of using some common problems, offer some solution methods of reference.

Phenomenon and case study: Generally speaking, arising this kind of condition is since USB MODEM is to supply power through USB interface, just starting time to compare short, network equipment have not been had no by activation or line by ADSL MODEM i.e. the reason of activation, have not caused line by activation to be obstructed.

Solve method: Have arisen similar problem, we may wait for patiently that 30 seconds is to some minutes , and then try connection , have time as soon as start may link , and at some time, want activation for some minutes or start again may just link; If line always can not activation words, possible network links the problem that line has arisen , please prompt telephone consulting local telecommunication office, this kind of condition relative occur is more few.

Phenomenon and case study: The reason of problem and possibility appearance is many , may have following reason mainly if removing the words of hardware damage and line damage( the machine rate that this condition arises very little): First, network equipment overheat arises the condition of working instability; It is second, the voluntarily broken line in IP adjustment process; 3th and the network system of telecommunication office collapse , the machine rate that this kind of condition arises is also little, however, the author has met twice.

Solve method: If being the condition that network equipment overheat arises working instability , generally speaking, such condition equipment may join voluntarily at once; Since ADSL MODEM give out heat to measure compare still is big, hand feels to go up scald very much, for equipment, work steadily , place it in the place with better ventilation still. Is development distribution because of the IP address of ADSL, have time therefore exactly its IP will adjust , will appear to lose the condition of line suddenly, as this kind of condition, need not mind , after some seconds of clocks, may join voluntarily , if company not go up, under one, the key of RESET IO is closed , then, restart may join. If above can not solve problem , may telephone ISP that consults you , definite one takes off whether is the problem that network center has arisen.

Generally speaking, the speed of the ADSL wide band of 1 MB for our daily use( high clear video-on-demand is excepted ) or some persons make being used say , it should be enough , but time opens web page slow very much.

Phenomenon and case study: First possibility is a few of WEB servers are busy, if opening other web pages to not slow, network should have no problem , is since a few of WEB servers compare the busy and net speed caused to slow very much. Secondly, possibility is to dial the compatibility problem between software and operating system. It may be still line quality again or is to be away from problem, because what ADSL uses is telephone line , cause net speed to reduce to slow if distance will arise signal attenuation after length.

Solve method: A few of WEB servers busy is not that we can solve , suggest that it is some of that you try thereafter again. When use dials software aspect, if you use operating system of Windows XP, system dials tool from tape, it need to be not other to dial software , suggests you to use RASPPPOE to dial software if using other systems. If is line quality or distance reason, ask you to contact with related telecommunication office( visit for you to install the district department of, debug ADSL , installation reserves have contact way). Downstairs, it is that example introduces relevant installation to really reach ADSL2110-EH MODEM( lead the way from function) with use. Normally, use IP of MODEM that acquiesces in: 192.168.10.1 need to be installed the agreement of TCP / IP as customer end( each join to the machine of HUB or switching equipment) machine after guaranteeing to net card and HUB or the connection of switching equipment well as well as the agreement of IPX / SPX of local area network, then, need to install IP address 192.168.10.X, follow MODEM the region of place is the same, son nets to cover yard 255.255.255.0 , acquiesces in gateway: 192.168.10.1( the IP address of MODEM), DNS server installs local telecommunications network Luo IP address. Other choice project acquiesces in may.

If use is to really reach 5800 U as well as similar do not lead the way by USB interface ADSL MODEM of function, actually also, may share go on-line. A machine with the connection of ADSL MODEM does host computer, and as other machines, through netting twine, join to HUB or switching equipment. In which on host computer, install IP address 192.168.0.1, son nets to cover yard 255.255.255.0 , acquiesces in gateway: 192.168.0.1, DNS server the local telecommunications network of installing Luo IP address, at the same time, choice passes through local area network to share ADSL , and can not open WIN XP on host computer from the fire wall of tape, otherwise will can not get on the Internet. Hold as customer, need to want to select to pass through the go on-line of local area network may , if is the system of WINXP, do not install basically may get on the Internet , this kind of method major yes abuse makes the performance of the machine of server is on good terms somewhat, also once server barrier machine, other users can not get on the Internet.

network bandwidth as well as the net way of use mainly, present normally general ADSL speeds has 512KBPS, 1MB and 2MB mainly, Cable MODEM and the sub-district bandwidth of wide band are even 10 m, but its actual speed often depends on the service quality of supplier , has time and can not reach the speed of name marked. Generally speaking, the network of 1 m bandwidthes may to let 1-12 personal net browse, chat and daily uses such as dispatcher E-mail have no problem , all user shares the bandwidth of 1 m together, but bandwidth is not that average distribution gives each computer, if a or some of machines in which at the same time use multi-line Cheng download tool download file or play some networks of more severe occupied bandwidth to play , so will plenty of occupied bandwidthes, cause other computer net speeds to slow too , can not even glance over web page. If often arise similar condition, suggesting the user in net to use single thread download or choice to get on the Internet for density not large time download.

Solve to share net problem , have 3 kinds of method mainly: Use HUB or switching equipment, directly join to the wiring of broadband networks HUB or switching equipment goes up , then through the net card of two computers, is linked respectively with HUB or switching equipment , may share wide band through sharing software; Secondly, on the machine that has joined wide band , install a net card again , block the net of other a computer to be linked to it , share software through network to share go on-line; Again, if your fund is relatively abundant, the netting twine that may select a router of wide band and will net coherent wide band receives the WAN port in router , and then blocks two computer nets to be linked with the LAN port of router to receive, PPPOE that deploies router dials function, may let wantonly a computer independent and net.

Many friends worry about that self shares the go on-line of wide band, own machine will be been dark , actually generally speaking, now share the function of software have compared is powerful, normally, it has the function of fire wall , when outside use joins the time of local area network, because of external local area network, has only a legal IP address, external world even if connection goes up , have also joined to only that server that shares. Other internal computers can not be visited , can not be also invaded , therefore compare with every computer independent go on-line, sharing go on-line have raised the router of other, a lot of wide bands and the safety property of computer greatly, also have the function of fire wall, so, outside connection also has the very router, the most hacker attack can no more take effect after meeting router , therefore has higher safety property, because router is to not fear to attack. Therefore, all though rest assured , general you will not be gone to by " dark "! the choice of many nows, what comparison is common is that choice the on line of USB Link will two computer interconnections, then, share go on-line again. What need to pay attention however is that the line of USB Link on line has two kinds: A kind of is to have offered the most simple file only to transmit function , and need to have the aid of special software to realize , this kind of line can not realize to share network; Additionally, a kind of USB line on line is integrated into special control chip, installation afterwards in hardware list meeting fictitious is network adapter, on use and disposition, may realize basically as net card to share go on-line , is short however comparing with netting twine for its connection to be away from comparison, and price will be a little bit more expensive. Besides, the way that you may still pass through wireless go on-line , though, it is convenient, however, the price of wireless equipment is also expensive.