Setting the emergency system
After the above operation, we have installed the emergency system on the basis of the original system. However, this system is mainly used for emergency. Therefore, in order to better protect this stealth system and prevent virus infection, you need to perform the following protection operations.
Step 1: Anti-virus. After entering the original system, start the computer management as above to expand "Storage → Disk Management", and select "Change drive letter and path" on the D drive in the right pane. Click "Delete" in the window that opens to delete the D drive letter. In this way, even if the original system is infected with a virus, the virus will not infect the stealth system (because the stealth system cannot be accessed in XP), and it can both protect the virus and realize the stealth of the second system in the original system.
Step 2: Upgrade the virus database. Because the stealth system is mainly used for emergency operations such as anti-virus and file extraction, we can manually upgrade the virus database of another system after the first system upgrades the virus database. For example, the author installs AVAST, as long as the entire folder contents of "C:\\Program Files\\Alwil Software\\Avast4" are copied to the corresponding position of the D disk on a regular basis (for example, one month). Note that disk management is required to reassign the drive letter to the stealth system before the original system operates on the stealth system. Same as above, in the disk management, right-click the partition of the deleted drive letter, select "Change drive name and path", click "Add", reassign a drive letter to this partition, and delete the disk after the virus is upgraded. symbol.
Step 3: Upgrade the system patch. System patch upgrades are recommended using 360 security guards. After running 360 Security Guard, switch to "Recover System Vulnerabilities", and then click "Rescan" to download the corresponding patch according to Dong's prompt. In the future, as long as you regularly enter the second system, run 360 security guards on the same line, click "Open the downloaded patch installer directory", open "C:\\Program Files\\360safe\\hotfix" to run the patch, and the stealth system is installed. The patch can be deleted (Figure 3).
Figure 3
Using the emergency system
Now, once the original system is damaged, or if you need to use the emergency system to maintain the original system, just choose to enter the emergency system in the multi-boot menu. Just fine. Below we list a few application examples.
Example 1: Killing the stubborn virus
Since the emergency system and the original system are relatively independent of the two systems, the virus infected in the original system will not start in the emergency system. Therefore, we only need to enter the emergency system to start the anti-virus software to kill the virus, or manually delete the stubborn virus in the emergency system. In addition, the emergency system can still upgrade the virus database or download the virus kill program. However, ADSL users, after entering the emergency system for the first time by default, need to open the Netman service to access the Internet. Click "Start" → "Run", enter "services.msc" to open the service management configuration window, find the Netman service, double-click to open the property settings window, set the startup type to "automatic", and click "start" to start the service After that, you can update the virus database or system patch online (Figure 4).
Figure 4
Tips for Master Dong:
Because the emergency system is on the D drive, some services that are loaded from the C drive by default may not be automatically opened. You need to open the service configuration window. Start the service. For example, the emergency system does not have the audiosrv service enabled (the audio cannot be turned on), the service needs to be started, and any other services can be manually turned on.
Under normal circumstances, the debugger is turned off, but some users report that when using some s
Users who use Windows 2000/XP know that it is best not to log in as a member of the Administrators g
. Its easy to underline characters in Word, but adding underscores is not that convenient. At some p
Many friends of WinXP system installed the latest SP3 patch, found that the Internet speed is slower
The system plug-in is interrupted from time to time. The shielding method is open
Press the Shift key to easily crack the Vista system
Tips for troubleshooting blue screen faults in Windows XP computer system
How to Decompose XP Device Manager Application Skills 3
Windows desktop comes with desktop search (2)
In-depth analysis of Windows operating system crashes (1)
Using MSDOS.SYS to install two Windows 98 at the same time
Why does the computer fail or crash when it sleeps
Teach you to add "read-only" attribute to USB in Windows XP
How to use the Windows XP Regsvr32 command to fix system failures
Windows XP classic Internet problem four
How to quickly restore the XP system administrator password three tips
Update the latest version of Windows Tuesday patch What should I do if my computer card is at 30%?
How to use the hard disk to install ubuntu kylin 14.10?
How to remove 360 firewall interception function? The 360 firewall method is introduced
Win10 arbitrary version free activation, crack method steps
Windows7 Ultimate Activation Key Summary_Windows7 Activation Key Permanent Edition Free Share
How does Win7 change the DNS address?
Basic Win7 system optimization operation
How to manually block malicious websites? Cleverly modify the hosts file
What should I do if Win8.1 Update cannot be updated normally?