Because Vista is unfavorable, Microsoft puts all its energy into the development of Windows 7. Microsoft is also trying to use Windows 7 to play a beautiful turnaround, sweeping away the negative impact of Vista on Microsoft. In order to achieve this effect, Microsoft must eliminate some of the less useful but very annoying features included in previous versions of Windows.
1.Windows Genuine Advantage (Windows Genuine Advantage)
Windows Genuine Advantage (also known as Microsoft Genuine Verification Program) in Vista is intended to determine whether the Windows system installed on your computer is It is genuine and reminds you to take action, that is, to resist piracy. If WGA detects that the system you are using is not a genuine system, it will take a series of actions on your system. In the early versions of WGA, it would directly deprive you of the right to access the system, which is somewhat sensational, isn't it? Now, WGA is no longer "severe". If the target user's computer is loaded with pirated Windows, then every time you start the user, you will be the victim of pirated software, and you can choose to do it later after 5 seconds. Although the window can be canceled by setting, but the verification icon on the tray after booting is not canceled, the verification icon will always exist unless the user purchases a genuine Windows key. Still, the real master knows how to avoid the harassment of WGA, so fundamentally, it has no purpose of existence. In general, WGA is a very impractical feature, and Microsoft should eliminate this annoying feature in Windows 7.
2. Registry
The Windows Registry is a central hierarchical database used in Microsoft Windows 9x, Windows CE, Windows NT, Windows 2000, Windows XP, and Windows Vista for storage. Information necessary to configure a system for one or more users, applications, and hardware devices. The registry contains information that Windows continuously references during runtime, such as each user's profile, the applications installed on the computer, and the property sheet settings for the document types, folders, and application icons that each application can create, the system Which hardware is present and which ports are being used. The registry is a set of files that control the appearance of the operating system and how it responds to incoming events. These "events" range from direct access to a hardware device to how the interface responds to a particular user to how the application works.
When a user is ready to run an application, the registry provides application information to the operating system so that the application can be found, the location of the correct data file is specified, and other settings can be used. The registry saves location information about the default and auxiliary files, menus, button bars, window states, and other options. It also saves installation information (such as date), user who installed the software, software version number and date, serial number, and so on. It includes different information depending on the software installed.
So, the registry is a huge data repository, which stores various information needed by the operating system and applications to run. Without it, the entire system will be in a state of paralysis. When you use an application to modify the behavior of Windows, it actually changes the registry on the ground floor. However, if you want to make a lot of changes to the system, then you have to edit the registry directly, which is a very cumbersome and highly dangerous thing. Because, with a little carelessness, you will make mistakes, and a small mistake in the registry may cause the entire system to collapse. Other operating systems, such as Apple's Mac OS X and open source Linux, do not have the concept of a registry, and they still perform very well. Microsoft should also consider giving up the use of the registry because it brings too many disasters to the Windows system.
3. ActiveX Controls (ActiveX Controls)
ActiveX is a technology that allows Web authors to embed small programs into Web pages or other interfaces to provide additional functionality. These embedded programs are called ActiveX Controls. Developers can create ActiveX controls using any programming language that supports the Microsoft Common Object Model. On the Internet, the features of the ActiveX plug-in software are: the general software requires the user to download and then perform the installation separately, and the ActiveX plug-in is that when the user browses to a specific webpage, the IE browser can automatically download and prompt the user to install. A prerequisite for the installation of the ActiveX plugin is that it must be approved and confirmed by the user.
Although the ActiveX control is powerful, it does not support other browsers. Moreover, it is very insecure and easy to be exploited by hackers as a very effective means of attacking the system. There are countless examples of using ActiveX controls for virus propagation. Although ActiveX controls are popular, they will never be long-term. Due to the rise of AJAX and Web 2.0 technologies, many websites are created using these two methods, so it is obvious that even without ActiveX, very complex applications can be provided through the browser. Under pressure from outside, Microsoft should stop using this technology.
4. User Account Control
User Account Control (UAC: User Account Control) is a new technology introduced by Microsoft in Windows Vista to improve system security. All users run programs and tasks in standard account mode, prevent unauthenticated program installations, and prevent standard users from making inappropriate system settings changes. In the beginning, this feature was once called User Account Protection and was later renamed to the current User Account Control.
UAC is mainly used to solve the problem of users logging in as an administrator. Because some system functions or programs need to be operated as administrators, many users (including IT experts) usually log in to the system as administrators, which brings quite a lot of problems to system security. Microsoft has also tried to solve this problem in previous operating systems. Now UAC allows users to log in as an administrator, but most of the operations are performed with normal user privileges. When the user tries to perform some operations that require higher privileges, the system Will enhance the user's operating permissions.
Although the user account control feature provides security for the system, the cost of this security is too high, and you need to tirelessly endure it over and over again - no meaning pop-ups and Absurd interruption. This is extremely inconvenient for users, and Microsoft should consider blocking this feature in Windows 7.
5. Windows Meeting Center
The Windows Conference Center is a new feature in Windows Vista, and many users have not even heard of it. Even if you know that such a feature exists, you may never have used it. The Windows Conference Center can be understood as an online virtual meeting room. Through the program, we can create a password-protected virtual space on the Internet, accepting access from friends or colleagues. In this virtual space, you can share applications, share files, and modify files.
But there is no whiteboard in the Windows Conference Center. The chat mode is worthless and does not support VoIP. Who will use this conference center? Windows 7 should not have this feature that is not very useful.
Recently, there are a lot of Win7 computer user feedback, the computer desktop suddenly has a last v
There are often users who have encountered Win7 color schemes changed, resulting in the Win7 interfa
Recently Xiaobian uses Windows 7 system, remote desktop connection to enter the user name and passwo
said that Windows 7 system demand is low, but we lack some real operating experience, a foreigner re
Wonderful use of Win7 comes with features to easily burn CDs
Explain the major "jump menus" of Windows 7
Five tips for making Windows 7 more secure (1)
Windows 7 system users share settings in the LAN (1)
Starting Tips: How to limit computer performance with msconfig
I want you to look good! Making a photo album with Win 7 does not lose a large movie
Wintel or replaced by Warm Win8 affects PC landscape
Tips for creating Windows 8 Start Menu by hand
There is no group policy to do the Windows 7 Home Edition optimization
Looking at the improvement of Windows7 through the Chinese version (3)
Windows 7 application skills: adjust the partition function in detail
Win10 how to change the default browser
What should I do if my computer is frequently stuck?
Windows7 Tips: Completely uninstall IE8 browser
10.8.3 After the update ssd need to open the trim solution
Win10 Preview: The new package management framework OneGet
How to modify the Windows 7 environment variable
Win10 application update starts to provide logs to know what content is upgraded
How to set up this computer without Win10 desktop? How can I retrieve this computer icon?