Third, the security design
In the Windows software transfer process, also considered the need for security. After the old and new computers are properly connected (if a connection request is made from the new computer to the old computer), the new computer will send a transfer password like the old one. Then on the new computer, the user will be prompted to "enter the Windows Easy Transfer Key displayed on the old computer." The user can start transferring files only after the key is entered correctly. This security measure guarantees the security of the file transmission process to a certain extent. However, this safety design is rather rough. It is only against the villain, not the gentleman. Why do you say that? In fact, its easy transfer function is implemented according to the Telnet protocol. However, this protocol has a large security flaw, that is, its content transmitted in the network is transmitted in plain text. Not only files, but passwords are also transmitted in clear text. For this reason, people with ulterior motives can easily steal the information they want without losing a sniffer on the network. Therefore, this security measure is not strict enough. But for most companies, this security measure is enough. After all, through the sniffer to illegally obtain information, not many happen in the enterprise.
Although this security design has certain flaws, it can be combined with other security measures to improve the security and stability of the transmission process. Such software transfer can be combined with IPSec security policies. If you only need to enable the IPSec security policy on both sides of the transmission, the system will automatically encrypt the data that needs to be transmitted. That is to say, this encryption is not implemented on the "software transfer" side, but on the underlying IP layer. Since the software transfer function can be seamlessly used in conjunction with the IPSec security policy, it is a good ending solution to use this security to encrypt related data and make up for the lack of security in software delivery. Instead of using encryption and decryption on the software transfer, you can also use existing solutions to improve security. This consideration of the Microsoft operating system is still worthy of recognition.
However, it should be noted that if a personal firewall is set in the computer, especially a third-party independent firewall, such as Rising's personal firewall, it may hinder the use of this software. To do this, you can temporarily turn off the firewall when using this software. Wait until the transfer is complete before turning the firewall back on.
Fourth, convenient management
After the file transfer is successful, the user can see a detailed list of the content that has been transferred. And there are related connections on this list. The user can directly open the corresponding file by clicking this connection. This is like using Thunder software to download files. In other words, you can use this software delivery tool to centrally manage the transferred files. Undoubtedly this software delivery tool has also become a file management tool invisibly. Files that have been transferred through it can be managed through this list. Including open, delete, and so on. What's rare is that it can also choose and default the default save path based on the content of the file transfer. If you are transferring Internet favorites, the system will automatically locate the input target and source target in the default directory of the Microsoft operating system storage favorites. If the system administrator does not need to change the target directory without changing the source directory, just press OK and you want to be able to transfer the files to the favorites without additional operations. Of course, the system administrator can also change the relevant directory. If you need to store your favorites on a non-system disk to prevent the system from crashing and the favorites are lost, you can also change this default path. It can be seen that Microsoft has spent a lot of thought on the design of this humanization. It does facilitate the operation of system administrators and users to a large extent. It is even more foolish to use. Even if there are not many computer-based users, you can easily master this software and complete the task of file transfer.
Laptop Although convenient, but the size is limited, the screen will not be too large, so ma
Nowadays, many mobile phones can use sound to control the mobile phone and perform various operation
Fat tiger, are you moving my files? With a sharp anger, a messy slippers sounded in the room. No..
laptop The only inconvenient place is the power consumption problem, the battery lasting for a long
Windows 7 sees the virtual memory consumed by the software in the task manager
Eight strokes to quickly reduce the shutdown time
Windows 7 system blue screen failure solution
Use the ReadyFor4GB tool on 32-bit Ultimate
Leave mode to save Win7 download (2)
Those windows7 tips that should not be missed (3)
Win7 system play violent motorcycle 2002 appeared flower screen how to do
Detailed Windows 7 program locking function
Quickly close the shortcut and cause the horizontal screen problem
3 solutions to the problem of suspended animation in the installation process of Win7
Optimized settings for the system after Win 7 installation is completed
Win 7 system voice recognition function to control computer operation
How does Win10 look at the Mac address
How to turn off Windows 8.1 application auto update
Win8 screen keyboard how to open Win8 keyboard is broken Emergency measures
Win8 set the method of automatic configuration script
Why does Windows XP shut down and restart
Invalid drive when installing win7 Ultimate computer: G: Error 1327 tips
Win8 comes with a video application to play video full picture illustration
Windows operating system to achieve automation
Win8.1 system backup and configuration recovery image skills
WinXP system network can not visit the seven major solutions