Wednesday, October 20, 2010

Keep their secrets to stay in someone else's computer



Cookie is a Web server sends to a computer data file, which records such as user names, passwords and other important information, even your bank account information!

To see Cookies, need to access C partition. However, the general prohibition of Internet cafe management software to access the partition, such as the now popular management software Mei-Ping, Vientiane, restore wizard and so on, although they vary, but generally it works very similar: using a virtual desktop environment to replace Windows desktop, Set against a variety of Windows systems through the basic operation, forcing the user can only limitations in the software activities. The key is how to lift the network access to the local hard disk, once entered a local hard disk, remove the cookie and other personal information back to talk to goes without saying.

Oh, do not worry, use the mouse to follow me.

The first one: Well, open a Web page, then click the IE browser menu "File" 鈫?"Save As", and then select any of the pop-up window to a folder, then press Shift + F10 key to bring up right , select one of the "Explorer" or "My Computer" will be able to open the selected folder.

The second measure: If you're lucky not so good, "Explorer" and "My Documents" and other windows have been banned, the first move will be invalid. However, there is no Internet cafes will not QQ process, hey, open your QQ, and then click the panel on "TE browser" icon, start TE browser, Mei-Ping IE settings made useful, but is a little TE not used. What you see is not all out?

The third measure: No such luck, right? Each other to "Tencent EXPlorer" also added to the "Management" tab of the "prohibited" tab now? Not disappointed, please click the Favorites icon in IE, the browser appears A favorite project areas, choose any one item, click the right mouse button, select "Properties" in the "Properties" dialog box in the address bar is the collection of items written by the project URL, will be deleted, changed to "C: (or other drive letter you want to visit) ", click" OK "to save the exit and return to the browser window, then click the newly revised favorites, ha ha, go in a row, and now open the c: windowscookies directory, the be surprised to see their web site has been visited a number of sources, will afford still ah. Stay an extra day risk of harm for one more day! Then delete Bai!

QQ Records

In the internet caf茅, we should focus on protecting natural to count QQ, and QQ number theft procedures are directed at Internet cafes in your left QQ record persuaded to leave. We Internet users in Internet cafes if they can delete the machine record time after the personal information of the file, you can avoid most of the attackers without fear of being exploited and crack out the password. Solution is to leave the bars before, in the QQ on the shortcut right-click pop-up menu select "Properties" in the "Directory" column to find QQ directory path, enter that number with you named folder, and then clean, delete this folder.

But the perk, perk, network management software if you are not allowed to delete files, ban your right, how should they respond?

Do not worry, please follow to do.

Step one: Open the Microsoft Pinyin input method (if there is no other input method can also be used).

Step two: Place the cursor into the text input box member card number, and then began to fill it enter any of the phonetic alphabet, and then there will be spelling the status bar, right click in the status bar, or the properties of keys on the keyboard, there will be a drop-down menu, choose the definition of the phrase (rest assured, even if the system limit right, is not useful in this).

Step Three: If the right network management software will lock up, you will also need to tune out right, right in the page to disable the situation encountered will come up with many ways to break, in fact, some of these methods can be moved to the operating system. To introduce the most common and most effective method of it: the need to manipulate the file or shortcut icon on the first point of living right link, and then point the next left, then release the left button, and finally release the right, then familiar right click menu will show in front of the. There is also a move more common, with the left mouse button click to select files to be deleted while holding down the shift + F10 key, you can show the Explorer context menu of a mouse.

Step Four: Right out, then the second step could be to do, and then select the File menu inside the "save as a text file," save

Step Five: In the pop-up dialog box, select a random folder, right click and select Explore!

Step Six: Choose what you want to delete folders and files, all OK.

Remove the above test method 100 Braun, network management software is not defensive approach.

Step Seven: Some users do not want to delete their own records, can be compressed using Winzip to account directory to a package file to the package file with the password string mouthful, to give it for one another unexpected extension. In the compression should be "implementation" set to "move file", and "contents of a folder that contains" and "Save folder other layers of information" option before they hit the bait. When the compression is completed, account has been empty directory, you no longer have to worry about the secret exposed, unless people know archive file name and password. Then package files on a hard disk inconspicuous corner or floppy disk. As for the resumption of direct use Winzip to unpack the installation disk QQ on the line. Can also protect the privacy of Internet cafes in the QQ.







相关链接:



Evaluation Browser Tools



Servlet and FILTER the url matches the url-pattern



Qingdao mode difficult to break the pain System



Let The Spirit Soar Your Football Career



"Open source COMMUNITIES in China" held in Sharon



Operation of supermarkets to dealers Suggestions



for you Backup And Restore



ASF to MPG



Taste Of Fresh Raw BPM Help Concubine Yang Lai



are you interested in some cheap games and



To Seek The Recovery Of The Annual Ceremony To Create Win-win Breakthrough Stage IDC



OGM to AVI



Urgent situation of 3G intellectual property rights on how long the operator toddler



Storage Hobby



Hot PIMS And Calendars



DivX to iPod



A key to the A + to help improve processes to achieve CMMI goals



No comments:

Post a Comment