The Detailed Description Using Cmd NTSD Command

The usage is  that open cmd and enter the following command can end the process:

Method 1: Using the PID of the end of the process
Command format: ntsd -c q -p pid
Examples: ntsd -cq -p 1332 (ending the explorer.exe process with PID 1332)
Detailed example: explorer.exe 'pid is 1332, but how to get process pid it? In the CMD, enter TASKLIST can get all the current task manager process PID (process is not all exploer.exe 1332)

Method 2: Using the end of the process name
Command format: ntsd -c q -pn ***. exe (***. exe name for the process, exe should not be spared)
Examples: ntsd -c q-pn explorer.exe
The other end of the process of DOS commands can also taskkill:
Command format: taskkill / pid 1234 / f (you can achieve the same effect.)

If the above can not satisfy your curiosity, here are:

ntsd Detailed Read more

Cannot Modify Header Information

If the program is running php see this warning: "Warning: Cannot modify header information - headers already sent by ...."
Few notes based on the following user posts:
There are several solutions:
1. Blank lines :
Make sure no blank line after of the calling php script.
Check is not followed by a blank line, in particular, include or require the file. Many problems caused by these blank lines.

2. Use exit statement (with the exit to solve):
Use exit after header statement seems to help some people
After the header with exit ();
header ("Location: xxx");
exit ();

3. PHP has this annoying problem, if your HTML goes before any PHP code or any header modification before redirecting to certain page, it'll said "Warning: Cannot modify header information - headers already sent by ...." Basically anytime you output to browser, the header is set and cannot be modified. So two ways to get around the problem: Read more

What is DDOS attack? Is there any way defense?

 

DDOS is an acronym of Distributed Denial of Service . And what is the denial of service ? Can be understood, all can lead to legitimate users don't access the normal behavior of network services are considered denial of service attacks. The purpose of denial of service attack is very clear, that is normal to prevent legitimate users access to network resources, so as to achieve the attacker's ulterior motives.

 It is also a denial of service attack, DDOS and DOS is different, DDOS attack strategies focused on by many zombie hosts (the host the attacker hacked or indirect use of )sends to the victim host a large number of seemingly legitimate network packets, resulting in network congestion or server resource exhaustion denial of service, distributed denial of service attack, once implemented, will attack like a flood of network packets flock to the victim host, thus bring the legitimate users of network packet flooding, leading to legal user can not access the network resources on severs. Therefore, denial of service attack has been called the "flood attacks," there is a Read more

the HTML Color Codes in Web Design

Maybe it's useful to somebody.

#000000 #2F0000 #600030 #460046 #28004D
#272727 #4D0000 #820041 #5E005E #3A006F
#3C3C3C #600000 #9F0050 #750075 #4B0091
#4F4F4F #750000 #BF0060 #930093 #5B00AE
#5B5B5B #930000 #D9006C #AE00AE #6F00D2
#6C6C6C #AE0000 #F00078 #D200D2 #8600FF
#7B7B7B #CE0000 #FF0080 #E800E8 #921AFF
#8E8E8E #EA0000 #FF359A #FF00FF #9F35FF
#9D9D9D #FF0000 #FF60AF #FF44FF #B15BFF
#ADADAD #FF2D2D #FF79BC #FF77FF #BE77FF
#BEBEBE #FF5151 #FF95CA #FF8EFF #CA8EFF
#d0d0d0 #ff7575 #ffaad5 #ffa6ff #d3a4ff
#E0E0E0 #FF9797 #FFC1E0 #FFBFFF #DCB5FF
#F0F0F0 #FFB5B5 #FFD9EC #FFD0FF #E6CAFF
#FCFCFC #FFD2D2 #FFECF5 #FFE6FF #F1E1FF
#FFFFFF #FFECEC #FFF7FB #FFF7FF #FAF4FF
#000079 #000079 #003E3E #006030 #006000
#000093 #003D79 #005757 #01814A #007500
#0000C6 #004B97 #007979 #019858 #009100
#0000C6 #005AB5 #009393 #01B468 #00A600
#0000E3 #0066CC #00AEAE #02C874 #00BB00
#2828FF #0072E3 #00CACA #02DF82 #00DB00
#4A4AFF #0080FF #00E3E3 #02F78E #00EC00
#6A6AFF #2894FF #00FFFF #1AFD9C #28FF28
#7D7DFF #46A3FF #4DFFFF #4EFEB3 #53FF53
#9393FF #66B3FF #80FFFF #7AFEC6 #79FF79
#AAAAFF #84C1FF #A6FFFF #96FED1 #93FF93
#B9B9FF #97CBFF #BBFFFF #ADFEDC #A6FFA6
#CECEFF #ACD6FF #CAFFFF #C1FFE4 #BBFFBB
#DDDDFF #C4E1FF #D9FFFF #D7FFEE #CEFFCE
#ECECFF #D2E9FF #ECFFFF #E8FFF5 #DFFFDF
#FBFBFF #ECF5FF #FDFFFF #FBFFFD #F0FFF0
#467500 #424200 #5B4B00 #844200 #642100
#548C00 #5B5B00 #796400 #9F5000 #842B00
#64A600 #737300 #977C00 #BB5E00 #A23400
#73BF00 #8C8C00 #AE8F00 #D26900 #BB3D00
#82D900 #A6A600 #C6A300 #EA7500 #D94600
#8CEA00 #C4C400 #D9B300 #FF8000 #F75000
#9AFF02 #E1E100 #EAC100 #FF9224 #FF5809
#A8FF24 #F9F900 #FFD306 #FFA042 #FF8040
#B7FF4A #FFFF37 #FFDC35 #FFAF60 #FF8F59
#C2FF68 #FFFF6F #FFE153 #FFBB77 #FF9D6F
#CCFF80 #FFFF93 #FFE66F #FFC78E #FFAD86
#D3FF93 #FFFFAA #FFED97 #FFD1A4 #FFBD9D
#DEFFAC #FFFFB9 #FFF0AC #FFDCB9 #FFCBB3
#E8FFC4 #FFFFCE #FFF4C1 #FFE4CA #FFDAC8
#EFFFD7 #FFFFDF #FFF8D7 #FFEEDD #FFE6D9
#F5FFE8 #FFFFF4 #FFFCEC #FFFAF4 #FFF3EE
#613030 #616130 #336666 #484891 #6C3365
#743A3A #707038 #3D7878 #5151A2 #7E3D76
#804040 #808040 #408080 #5A5AAD #8F4586
#984B4B #949449 #4F9D9D #7373B9 #9F4D95
#AD5A5A #A5A552 #5CADAD #8080C0 #AE57A4
#B87070 #AFAF61 #6FB7B7 #9999CC #B766AD
#C48888 #B9B973 #81C0C0 #A6A6D2 #C07AB8
#CF9E9E #C2C287 #95CACA #B8B8DC #CA8EC2
#D9B3B3 #CDCD9A #A3D1D1 #C7C7E2 #D2A2CC
#E1C4C4 #D6D6AD #B3D9D9 #D8D8EB #DAB1D5
#EBD6D6 #DEDEBE #C4E1E1 #E6E6F2 #E2C2DE
#F2E6E6 #E8E8D0 #D1E9E9 #F3F3FA #EBD3E8

How to delete the System Volume Information folder

How to delete the System Volume Information folder

Sometimes we will find the hard disk inside each partition has a System Volume Information folder and also can not delete this folder , and what is the System Volume Information folder to do,  can it be deleted, how should I delete it. Here I come to you talk about the computer skills of the System Volume Information folder.
What is the System Volume Information folder?

System Volume Information folder is a hidden system folder ."System Restore" tool use the folder to store its information and restore points. Your computer each partition has a System Volume Information folder. This folder is stored with the system restore backup information, the user uses the system with the time increase, the restore points become more and more, and finally will lead to hard disk space be less and less.

Look at FAT32 format System Volume Information folder

For the System Volume Information folder in a FAT32 file system ,you can view the contents inside without any setting.

Look at NTFS format System Volume Information folder

Right-click the System Volume Information folder in the root folder , then click the "XP Download Sharing and Security" - single click the Security tab - Click "Advanced" -  hook the "Allow inheritable permissions from father to propagate to this object" in the first - click "OK." In this way, you can open the System Volume Information folder, delete the files inside.

Completely remove the System Volume Information folder

1, Run, type "gpedit.msc" /(Group Policy) program/Computer Configuration/Administrative Templates/System/System Restore/right, turn off System Restore, double-click to open it, and enabled.

2, Run, type "gpedit.msc" /(Group Policy) program/Computer Configuration/Administrative Templates/windows components/windows Installer/ on the right there will be a "turn off System Restore check points to create" double click to open it, select Enable .

Use the cacls command to give the current user full control permissions to delete the System Volume Information  folder, the command is as follows: 'cacls "c:\System Volume Information" /g everyone: f 'this is to give all users on the c drive System Volume Information file Full Control permission on the folder, you can delete it.

Through the basic explanation of the System Volume Information folder  , all of us should know how to look at System Volume Information folder, how to delete the System Volume Information folder.We will learn more computer skills.

This address is http://www.computerites.com/computer-skills/2011/11/how-to-delete-the-system-volume-information-folder-6.html