Note that Windows must clear five features

  
1. Windows Genuine Advantage (Windows Genuine Advantage) Windows Genuine Advantage (also known as Microsoft Genuine Verification Program) in Vista is intended to determine whether the Windows system installed on your computer is genuine and Remind you to take action, that is, to resist piracy. If WGA detects that the system you are using is not a genuine system, it will take a series of actions on your system. In the early versions of WGA, it would directly deprive you of the right to access the system, which is somewhat sensational, isn't it? Now, WGA is no longer "severe". If the target user's computer is loaded with pirated Windows, then every time you start the user, you will be the victim of pirated software, and you can choose to do it later after 5 seconds. Although the window can be canceled by setting, but the verification icon on the tray after booting is not canceled, the verification icon will always exist unless the user purchases a genuine Windows key. Still, the real master knows how to avoid the harassment of WGA, so fundamentally, it has no purpose of existence. In general, WGA is a very impractical feature, and Microsoft should eliminate this annoying feature in Windows 7. 2. Registry The Windows Registry is a central hierarchical database used in Microsoft Windows 9x, Windows CE, Windows NT, Windows 2000, Windows XP, and Windows Vista for storage as one or more users, applications, and hardware devices. The information necessary to configure the system. The registry contains information that Windows continuously references during runtime, such as each user's profile, the applications installed on the computer, and the property sheet settings for the document types, folders, and application icons that each application can create, the system Which hardware is present and which ports are being used. The registry is a set of files that control the appearance of the operating system and how it responds to incoming events. These "events" range from direct access to a hardware device to how the interface responds to a particular user to how the application works. When a user is ready to run an application, the registry provides application information to the operating system so that the application can be found, the location of the correct data file is specified, and other settings can be used. The registry saves location information about the default and auxiliary files, menus, button bars, window states, and other options. It also saves installation information (such as date), user who installed the software, software version number and date, serial number, and so on. It includes different information depending on the software installed. So, the registry is a huge data repository, which stores the various information needed by the operating system and applications to run. Without it, the entire system will be in a state of paralysis. When you use an application to modify the behavior of Windows, it actually changes the registry on the ground floor. However, if you want to make a lot of changes to the system, then you have to edit the registry directly, which is a very cumbersome and highly dangerous thing. Because, with a little carelessness, you will make mistakes, and a small mistake in the registry may cause the entire system to collapse. Other operating systems, such as Apple's Mac OS X and open source Linux, do not have the concept of a registry, and they still perform very well. Microsoft should also consider giving up the use of the registry because it brings too many disasters to the Windows system. 3. ActiveX Controls ActiveX is a technology that allows Web authors to embed small programs into Web pages or other interfaces to provide additional functionality. These embedded programs are called ActiveX Controls. Developers can create ActiveX controls using any programming language that supports the Microsoft Common Object Model. On the Internet, the features of the ActiveX plug-in software are: the general software requires the user to download and then perform the installation separately, and the ActiveX plug-in is that when the user browses to a specific webpage, the IE browser can automatically download and prompt the user to install. A prerequisite for the installation of the ActiveX plugin is that it must be approved and confirmed by the user. Although the ActiveX control is powerful, it does not support other browsers. Moreover, it is very insecure and easy to be exploited by hackers as a very effective means of attacking the system. There are countless examples of using ActiveX controls for virus propagation. Although ActiveX controls are popular, they will never be long-term. Due to the rise of AJAX and Web 2.0 technologies, many websites are created using these two methods, so it is obvious that even without ActiveX, very complex applications can be provided through the browser. Under pressure from outside, Microsoft should stop using this technology. 4. User Account Control User Account Control (UAC: User Account Control) is a new technology introduced by Microsoft in Windows Vista to improve system security. It requires all users to run programs and tasks in standard account mode. The certified program is installed and prevents standard users from making inappropriate system settings changes. In the beginning, this feature was once called User Account Protection and was later renamed to the current User Account Control. UAC is mainly used to solve the problem of users logging in as an administrator. Because some system functions or programs need to be operated as administrators, many users (including IT experts) usually log in to the system as administrators, which brings quite a lot of problems to system security. Microsoft has also tried to solve this problem in previous operating systems. Now UAC allows users to log in as an administrator, but most of the operations are performed with normal user privileges. When the user tries to perform some operations that require higher privileges, the system Will enhance the user's operating permissions. While the user account control feature provides security to the system, the cost of this security is too high, and you need to tirelessly endure it over and over again - no pop-ups and absurd interruptions of any significance. This is extremely inconvenient for users, and Microsoft should consider blocking this feature in Windows 7. 5. Windows Meeting Center The Windows Meeting Center is a new feature in Windows Vista that many users have not even heard of. Even if you know that such a feature exists, you may never have used it. The Windows Conference Center can be understood as an online virtual meeting room. Through the program, we can create a password-protected virtual space on the Internet, accepting access from friends or colleagues. In this virtual space, you can share applications, share files, and modify files. But there is no whiteboard in the Windows Conference Center. The chat mode is worthless and does not support VoIP. Who will use this conference center? Windows 7 should not have this feature that is not very useful.
Copyright © Windows knowledge All Rights Reserved