< Br>
5.Protect important files
Password protection for important files, which is easy to implement in Word
and Excel. Select "File" and "Save As" in turn. Then select "General Options" in "Tools", enter the password in "Open Permission Password" and "Modify Permission Password". It is best not to use real words and dates as passwords. Mixing letters, numbers, and punctuation marks makes passwords difficult to decipher. Of course, you must enter your password each time you open and modify a document.
This step adds one to our important files. Lock the
6. Rewrite the web access history
The browser is another part that needs to be protected. Most users now use Internet Explorer because they have installed Microsoft's Windows system. As a browser for Internet access, Internet Explorer will list all the objects that have been visited, including the pages that have been viewed, the queries that have been made, and the data that has been entered. Internet Explorer saves the page visit history in a folder divided by week or by URL. We can delete individual "URLs" individually, but the quickest way is to delete the entire folder. To clear all history, select Internet Options from the Tools menu, then select the General tab and click the Clear History button.
This step is to clear the history of the browser.
7. Enter the URL but not be recorded
Internet Explorer records each URL you enter in the browser, you may wish to verify: enter a URL in the address window below the toolbar The address, which the browser will record in the drop-down menu until there are other items to replace it. You can access the website in the following way, and the URL used will not be recorded: you can press Ctrl-O in the browser and enter the URL address in the dialog box.
This step allows the visited URL to not be recorded.
8. Clear information
cache Internet Explorer cache web pages you visited recently in the hard disk. Cache information speeds up web page access when you visit these pages again, but it also reveals your secret to snoopers. To clear the information in the cache, in Internet Explorer, select "Internet Options" in the "Tools" menu, then go to the "General" tab and click the "Delete Files" button.
The multi-system we usually use is generally built like this: first install an operating system, the
Unable to locate program input point msvcr100.dll, msvcr100.dll, unable to locate msvcrt.dll
After using the WinXP system for a period of time, it is possible to pop up the Insufficient
Now there are more and more Windows vulnerabilities, especially some major vulnerabilities m
Network Neighborhood Settings Tips (1)
WinXP SP2 v2082 Chinese version installation diagram
Blue screen TOP: 0x000000F4 error analysis and resolution reference (2)
Clearly understand the system process
Windows XP operating system memory optimization guide
Nine Tips for Improving Run Speed
The strongest Windows XP system startup speed tips
PrintScreen key knows how much
Practical commands and operating skills in Windows XP
Linux system UMASK usage details
Windows system folder has what content
Win10 unlocks the registry editor method
How to use the Administrator account in Win XP
The singular network shield common problem summary
Win7 Ultimate computer can not start windows help and support how to do
Monitoring the performance bottleneck of Windows 7 system
Make Win8 more suitable for touch modification registry entries
How does Win8 use its own convenient tools for financial applications
Windows 7 optimization settings make computer security even more