Tutorials to .com

Tutorials to .com » Operating System

Operating System Articles


1: RedhatLinuxonmyLAPTOP
I am a Linux fan, that is like the blind Daogu Linux operating system. The Caca, where I buy a laptop before the laptop repeatedly consider the Linux compatibility, it seems, or Toshiba's books looked relatively good, hard-hearted and bought Tos...

2: Guaranteed not worry! The firewall to defend the security of shares under the
Enable Windows XP's "Internet Connection Firewall", you can effectively prevent port scanning and denial of service attacks, and thus peace of mind Internet surfing. Security has been assured, a new problem has arisen, if you are on th...

3: SlackwareLinux101 boot Linux in what occurred when the machine
Author: Joe "Zonker" Brockmeier (jbrockmeier@earthlink.net), senior editor, User Friendly Media Abstract: Joe Brockmeier study Slackware Linux init process. He discussed the system how to initialize the service, a variety of operating lev...

4: User must have read the Windows "virtual memory" problem
This paper describes the virtual memory settings and the associated solution to the problem. The role of memory in the computer large computer all running programs need to go through the memory to perform, if the procedures for the implementation o...

5: By knoppix install debian Xiangjie
Super-simple debian installation and localization - knoppix A few weeks ago, a brother, in particular through knoppix to install debian is very simple. knoppix right hardware recognition much stronger than the debian's official release, and X,...

6: By knoppix install debian Xiangjie
Super-simple debian installation and localization - knoppix A few weeks ago, a brother, in particular through knoppix to install debian is very simple. knoppix right hardware recognition much stronger than the debian's official release, and X,...

7: Careful excavation system tools so different (Figure)
Here is important to note one thing: Disk Cleanup Settings there is a "compress old files" only in the NTFS file format, effectively, this time the system will be based on the file access time will be those who for a long time unused or ra...

8: Careful excavation system tools so different (Figure)
Here is important to note one thing: Disk Cleanup Settings there is a "compress old files" only in the NTFS file format, effectively, this time the system will be based on the file access time will be those who for a long time unused or ra...

9: Careful excavation system tools so different (Figure)
Here is important to note one thing: Disk Cleanup Settings there is a "compress old files" only in the NTFS file format, effectively, this time the system will be based on the file access time will be those who for a long time unused or ra...

10: Small heterogeneous Linux Network Security Policy
Currently, many small and medium business users who wish to continuously update or upgrade the network, resulting in large differences in their own user environment, the whole network system platform, uneven, in the server-side most of the use of Li...

11: Better than XP: Look for loopholes in Windows Vista
Reference to Windows Vista, the existence of loopholes - and then there are loopholes. No doubt, people will in this oft-delayed operating system, test the second edition (Beta 2) found fault. The problem is that Microsoft's ability to handle t...

12: Better than XP: Look for loopholes in Windows Vista
Reference to Windows Vista, the existence of loopholes - and then there are loopholes. No doubt, people will in this oft-delayed operating system, test the second edition (Beta 2) found fault. The problem is that Microsoft's ability to handle t...

13: Use Ghost to copy your Linux system
REM This file is: C: \ LINUX \ LINUX.bat REM ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ REM REM The following is the entire hard disk (master disk) partition status: REM ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ REM 2003 Nian 05 Yue 16 PM 17:13:26 [root @ localhos...

14: Linux on the e-mail gateway (killed virus) AntiVirMailGate
Linux on the e-mail gateway (to kill the virus) AntiVir MailGate, it has two methods: 1. For direct use as mail gateways, and then use the "channel" called smtp program. Supports standard smtp program: sendmail, postfix, qmail. 2. Is to ...

15: WindowsXP operating system, image-making skills to run
1, the system disk to streamline the Usually we installed the system has a lot of components and services are not needed, usually simply less than, so we can XP (2000) to streamline the installation disk, eliminating what we do not use content. Her...

16: Windows multi-boot of the important documents
Now install the multi-boot system, more and more friends, but few people fully aware that in the multi-boot system, the role of several important documents are. Let I be a simple introduction, hope everyone to be able to focus on these documents to ...

17: Latest RedhatLinux9quota disk space configuration instructions
Latest Redhat Linux9 quota of disk space allocation shows that the program has been on more than one server, set up successful, absolutely can have. Testing machine using Redhat Linux9 default installation, all the program files installed in (/ dev...

18: Set of six ways to completely optimize the IE browser
Temporary files: IE will be the process of going online in the system tray automatically into viewed images, animations, Cookies and text data remain in the C: \ Documents and Settings \ work hard \ Local Settings \ Temporary Internet Files (antedi...

19: Shoubashoujiao you install debian (2)
Base system installation and the selection of modules configured base system is very important, because it can build a very stable foundation, but also eliminates the need to compile the kernel after the trouble. However, there are numerous options ...

20: Seven commonly used hacking tricks WinXP system
This article describes the Windows XP operating system, hackers commonly used seven kinds of methods that will happen if we encounter a similar attention ... ... The first one: Screen Saver In the Windows screen saver is enabled, after, as long as...